Critical Watch
AI-curated daily picks – the most critical CVEs requiring immediate attention
Complete authentication bypass in OpenVPN OAuth2 plugin (v1.26.3-1.27.2) allows unauthenticated VPN access with active threat intelligence indicating known actors/malware exploitation, exposing enterprise networks to immediate breach risk.
Unauthenticated SMTP configuration takeover in Sendmachine WordPress plugin allows attackers to redirect all organizational emails, enabling credential theft, phishing campaigns, and business email compromise attacks against WordPress installations.
Remote code execution in ModelScope AgentScope allows unauthenticated attackers to execute arbitrary Python code or shell commands, posing immediate threat to organizations using this AI agent framework.
Unauthenticated file upload in Langflow (popular AI workflow tool) enables remote code execution through the upload API, threatening organizations deploying AI/LLM applications.
CSRF vulnerability in ComfyUI (widely-used AI image generation interface) allows unauthenticated attackers to modify application state, risking unauthorized changes to AI workflows and configurations.
SSRF in ModelScope AgentScope permits unauthenticated attackers to manipulate internal network requests through image/audio URL parameters, enabling potential data exfiltration from AI agent deployments.
Denial of service in FastChat (popular LLM serving framework from LMSYS) allows remote attackers to exhaust resources and disrupt AI model serving infrastructure with patch available.
Critical remote code execution in SAIL image library (widely used for image processing across multiple platforms) via malformed XWD files, with patch available but likely affecting many applications that handle untrusted images.
Heap buffer overflow enabling RCE in SAIL's TGA decoder affects network-accessible applications processing TGA images, a common format in gaming and graphics applications with widespread deployment.
Remote code execution via malicious PSD files in SAIL codec poses significant risk to creative software, design tools, and content management systems that process Photoshop files from untrusted sources.
Critical unauthenticated remote code execution in WebStack WordPress theme affects any site using this theme, allowing attackers to upload malicious files and gain server access with no authentication required.
SQL injection in SAP Business Planning and Consolidation (widely deployed enterprise software) allows authenticated attackers to execute arbitrary SQL with scope change, threatening critical financial/planning data across thousands of organizations.
Unauthenticated remote code execution in Talend JobServer via exposed JMX interface enables attackers to gain server-level access without credentials in data integration environments used by many enterprises.
Remote unauthenticated code execution in PraisonAI workflow engine through malicious YAML files allows attackers to run arbitrary commands, affecting AI/ML development environments with minimal security controls.
Totolink A7100RU routers are widely deployed in SOHO/SMB environments, and this unauthenticated remote command injection with public exploit allows complete router compromise without authentication.
Another unauthenticated RCE in the same widely-used Totolink A7100RU router with public POC, affecting OpenVPN certificate upload functionality accessible to remote attackers.
Third critical unauthenticated RCE in Totolink A7100RU firmware upload function with public exploit, allowing attackers to gain full router control remotely without credentials.
Fourth unauthenticated RCE vector in the same Totolink A7100RU router via QoS configuration, compounding the attack surface for this popular consumer/small business router model.
Fifth unauthenticated RCE in Totolink A7100RU's wizard setup function with public POC, representing another critical entry point for attackers targeting this widespread router platform.
Code injection in MetaGPT (popular AI agent framework with significant enterprise adoption) allows unauthenticated remote code execution with public exploit available, affecting organizations deploying AI automation tools.
Sonos Era 300 smart speakers are widely deployed in homes and offices, and this CVSS 10.0 kernel-level RCE via SMB responses poses extreme risk to any network where these devices are present.
Totolink A7100RU router has unauthenticated remote command injection with public exploit available, allowing complete device compromise of network infrastructure equipment.
Tenda i6 router path traversal allows unauthenticated attackers to read/write arbitrary files on widely-deployed consumer/SOHO network devices with public exploit.
Tenda AC9 router buffer overflow enables authenticated remote code execution on popular consumer routers with public exploit, requiring only low-privilege access.
CouchCMS privilege escalation allows any admin to become superadmin via simple parameter manipulation, threatening content management systems with public exploit.