Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2026-0405

Publication date:
13/01/2026
An authentication bypass vulnerability in NETGEAR Orbi devices allows <br /> users connected to the local network to access the router web interface <br /> as an admin.
Severity CVSS v4.0: MEDIUM
Last modification:
13/01/2026

CVE-2026-0406

Publication date:
13/01/2026
An insufficient input validation vulnerability in the NETGEAR XR1000v2 <br /> allows attackers connected to the router&amp;#39;s LAN to execute OS command <br /> injections.
Severity CVSS v4.0: MEDIUM
Last modification:
13/01/2026

CVE-2026-0407

Publication date:
13/01/2026
An insufficient authentication vulnerability in NETGEAR WiFi range <br /> extenders allows a network adjacent attacker with WiFi authentication or<br /> a physical Ethernet port connection to bypass the authentication <br /> process and access the admin panel.
Severity CVSS v4.0: MEDIUM
Last modification:
13/01/2026

CVE-2025-71093

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> e1000: fix OOB in e1000_tbi_should_accept()<br /> <br /> In e1000_tbi_should_accept() we read the last byte of the frame via<br /> &amp;#39;data[length - 1]&amp;#39; to evaluate the TBI workaround. If the descriptor-<br /> reported length is zero or larger than the actual RX buffer size, this<br /> read goes out of bounds and can hit unrelated slab objects. The issue<br /> is observed from the NAPI receive path (e1000_clean_rx_irq):<br /> <br /> ==================================================================<br /> BUG: KASAN: slab-out-of-bounds in e1000_tbi_should_accept+0x610/0x790<br /> Read of size 1 at addr ffff888014114e54 by task sshd/363<br /> <br /> CPU: 0 PID: 363 Comm: sshd Not tainted 5.18.0-rc1 #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x5a/0x74<br /> print_address_description+0x7b/0x440<br /> print_report+0x101/0x200<br /> kasan_report+0xc1/0xf0<br /> e1000_tbi_should_accept+0x610/0x790<br /> e1000_clean_rx_irq+0xa8c/0x1110<br /> e1000_clean+0xde2/0x3c10<br /> __napi_poll+0x98/0x380<br /> net_rx_action+0x491/0xa20<br /> __do_softirq+0x2c9/0x61d<br /> do_softirq+0xd1/0x120<br /> <br /> <br /> __local_bh_enable_ip+0xfe/0x130<br /> ip_finish_output2+0x7d5/0xb00<br /> __ip_queue_xmit+0xe24/0x1ab0<br /> __tcp_transmit_skb+0x1bcb/0x3340<br /> tcp_write_xmit+0x175d/0x6bd0<br /> __tcp_push_pending_frames+0x7b/0x280<br /> tcp_sendmsg_locked+0x2e4f/0x32d0<br /> tcp_sendmsg+0x24/0x40<br /> sock_write_iter+0x322/0x430<br /> vfs_write+0x56c/0xa60<br /> ksys_write+0xd1/0x190<br /> do_syscall_64+0x43/0x90<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> RIP: 0033:0x7f511b476b10<br /> Code: 73 01 c3 48 8b 0d 88 d3 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d f9 2b 2c 00 00 75 10 b8 01 00 00 00 0f 05 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 8e 9b 01 00 48 89 04 24<br /> RSP: 002b:00007ffc9211d4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001<br /> RAX: ffffffffffffffda RBX: 0000000000004024 RCX: 00007f511b476b10<br /> RDX: 0000000000004024 RSI: 0000559a9385962c RDI: 0000000000000003<br /> RBP: 0000559a9383a400 R08: fffffffffffffff0 R09: 0000000000004f00<br /> R10: 0000000000000070 R11: 0000000000000246 R12: 0000000000000000<br /> R13: 00007ffc9211d57f R14: 0000559a9347bde7 R15: 0000000000000003<br /> <br /> Allocated by task 1:<br /> __kasan_krealloc+0x131/0x1c0<br /> krealloc+0x90/0xc0<br /> add_sysfs_param+0xcb/0x8a0<br /> kernel_add_sysfs_param+0x81/0xd4<br /> param_sysfs_builtin+0x138/0x1a6<br /> param_sysfs_init+0x57/0x5b<br /> do_one_initcall+0x104/0x250<br /> do_initcall_level+0x102/0x132<br /> do_initcalls+0x46/0x74<br /> kernel_init_freeable+0x28f/0x393<br /> kernel_init+0x14/0x1a0<br /> ret_from_fork+0x22/0x30<br /> The buggy address belongs to the object at ffff888014114000<br /> which belongs to the cache kmalloc-2k of size 2048<br /> The buggy address is located 1620 bytes to the right of<br /> 2048-byte region [ffff888014114000, ffff888014114800]<br /> The buggy address belongs to the physical page:<br /> page:ffffea0000504400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14110<br /> head:ffffea0000504400 order:3 compound_mapcount:0 compound_pincount:0<br /> flags: 0x100000000010200(slab|head|node=0|zone=1)<br /> raw: 0100000000010200 0000000000000000 dead000000000001 ffff888013442000<br /> raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000<br /> page dumped because: kasan: bad access detected<br /> ==================================================================<br /> <br /> This happens because the TBI check unconditionally dereferences the last<br /> byte without validating the reported length first:<br /> <br /> u8 last_byte = *(data + length - 1);<br /> <br /> Fix by rejecting the frame early if the length is zero, or if it exceeds<br /> adapter-&gt;rx_buffer_len. This preserves the TBI workaround semantics for<br /> valid frames and prevents touching memory beyond the RX buffer.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71094

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: usb: asix: validate PHY address before use<br /> <br /> The ASIX driver reads the PHY address from the USB device via<br /> asix_read_phy_addr(). A malicious or faulty device can return an<br /> invalid address (&gt;= PHY_MAX_ADDR), which causes a warning in<br /> mdiobus_get_phy():<br /> <br /> addr 207 out of range<br /> WARNING: drivers/net/phy/mdio_bus.c:76<br /> <br /> Validate the PHY address in asix_read_phy_addr() and remove the<br /> now-redundant check in ax88172a.c.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71095

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: stmmac: fix the crash issue for zero copy XDP_TX action<br /> <br /> There is a crash issue when running zero copy XDP_TX action, the crash<br /> log is shown below.<br /> <br /> [ 216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000<br /> [ 216.187524] Internal error: Oops: 0000000096000144 [#1] SMP<br /> [ 216.301694] Call trace:<br /> [ 216.304130] dcache_clean_poc+0x20/0x38 (P)<br /> [ 216.308308] __dma_sync_single_for_device+0x1bc/0x1e0<br /> [ 216.313351] stmmac_xdp_xmit_xdpf+0x354/0x400<br /> [ 216.317701] __stmmac_xdp_run_prog+0x164/0x368<br /> [ 216.322139] stmmac_napi_poll_rxtx+0xba8/0xf00<br /> [ 216.326576] __napi_poll+0x40/0x218<br /> [ 216.408054] Kernel panic - not syncing: Oops: Fatal exception in interrupt<br /> <br /> For XDP_TX action, the xdp_buff is converted to xdp_frame by<br /> xdp_convert_buff_to_frame(). The memory type of the resulting xdp_frame<br /> depends on the memory type of the xdp_buff. For page pool based xdp_buff<br /> it produces xdp_frame with memory type MEM_TYPE_PAGE_POOL. For zero copy<br /> XSK pool based xdp_buff it produces xdp_frame with memory type<br /> MEM_TYPE_PAGE_ORDER0. However, stmmac_xdp_xmit_back() does not check the<br /> memory type and always uses the page pool type, this leads to invalid<br /> mappings and causes the crash. Therefore, check the xdp_buff memory type<br /> in stmmac_xdp_xmit_back() to fix this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71096

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly<br /> <br /> The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a<br /> LS_NLA_TYPE_DGID attribute, it is invalid if it does not.<br /> <br /> Use the nl parsing logic properly and call nla_parse_deprecated() to fill<br /> the nlattrs array and then directly index that array to get the data for<br /> the DGID. Just fail if it is NULL.<br /> <br /> Remove the for loop searching for the nla, and squash the validation and<br /> parsing into one function.<br /> <br /> Fixes an uninitialized read from the stack triggered by userspace if it<br /> does not provide the DGID to a kernel initiated RDMA_NL_LS_OP_IP_RESOLVE<br /> query.<br /> <br /> BUG: KMSAN: uninit-value in hex_byte_pack include/linux/hex.h:13 [inline]<br /> BUG: KMSAN: uninit-value in ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490<br /> hex_byte_pack include/linux/hex.h:13 [inline]<br /> ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490<br /> ip6_addr_string+0x18a/0x3e0 lib/vsprintf.c:1509<br /> ip_addr_string+0x245/0xee0 lib/vsprintf.c:1633<br /> pointer+0xc09/0x1bd0 lib/vsprintf.c:2542<br /> vsnprintf+0xf8a/0x1bd0 lib/vsprintf.c:2930<br /> vprintk_store+0x3ae/0x1530 kernel/printk/printk.c:2279<br /> vprintk_emit+0x307/0xcd0 kernel/printk/printk.c:2426<br /> vprintk_default+0x3f/0x50 kernel/printk/printk.c:2465<br /> vprintk+0x36/0x50 kernel/printk/printk_safe.c:82<br /> _printk+0x17e/0x1b0 kernel/printk/printk.c:2475<br /> ib_nl_process_good_ip_rsep drivers/infiniband/core/addr.c:128 [inline]<br /> ib_nl_handle_ip_res_resp+0x963/0x9d0 drivers/infiniband/core/addr.c:141<br /> rdma_nl_rcv_msg drivers/infiniband/core/netlink.c:-1 [inline]<br /> rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]<br /> rdma_nl_rcv+0xefa/0x11c0 drivers/infiniband/core/netlink.c:259<br /> netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]<br /> netlink_unicast+0xf04/0x12b0 net/netlink/af_netlink.c:1346<br /> netlink_sendmsg+0x10b3/0x1250 net/netlink/af_netlink.c:1896<br /> sock_sendmsg_nosec net/socket.c:714 [inline]<br /> __sock_sendmsg+0x333/0x3d0 net/socket.c:729<br /> ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2617<br /> ___sys_sendmsg+0x271/0x3b0 net/socket.c:2671<br /> __sys_sendmsg+0x1aa/0x300 net/socket.c:2703<br /> __compat_sys_sendmsg net/compat.c:346 [inline]<br /> __do_compat_sys_sendmsg net/compat.c:353 [inline]<br /> __se_compat_sys_sendmsg net/compat.c:350 [inline]<br /> __ia32_compat_sys_sendmsg+0xa4/0x100 net/compat.c:350<br /> ia32_sys_call+0x3f6c/0x4310 arch/x86/include/generated/asm/syscalls_32.h:371<br /> do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]<br /> __do_fast_syscall_32+0xb0/0x150 arch/x86/entry/syscall_32.c:306<br /> do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331<br /> do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:3
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71097

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipv4: Fix reference count leak when using error routes with nexthop objects<br /> <br /> When a nexthop object is deleted, it is marked as dead and then<br /> fib_table_flush() is called to flush all the routes that are using the<br /> dead nexthop.<br /> <br /> The current logic in fib_table_flush() is to only flush error routes<br /> (e.g., blackhole) when it is called as part of network namespace<br /> dismantle (i.e., with flush_all=true). Therefore, error routes are not<br /> flushed when their nexthop object is deleted:<br /> <br /> # ip link add name dummy1 up type dummy<br /> # ip nexthop add id 1 dev dummy1<br /> # ip route add 198.51.100.1/32 nhid 1<br /> # ip route add blackhole 198.51.100.2/32 nhid 1<br /> # ip nexthop del id 1<br /> # ip route show<br /> blackhole 198.51.100.2 nhid 1 dev dummy1<br /> <br /> As such, they keep holding a reference on the nexthop object which in<br /> turn holds a reference on the nexthop device, resulting in a reference<br /> count leak:<br /> <br /> # ip link del dev dummy1<br /> [ 70.516258] unregister_netdevice: waiting for dummy1 to become free. Usage count = 2<br /> <br /> Fix by flushing error routes when their nexthop is marked as dead.<br /> <br /> IPv6 does not suffer from this problem.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71098

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ip6_gre: make ip6gre_header() robust<br /> <br /> Over the years, syzbot found many ways to crash the kernel<br /> in ip6gre_header() [1].<br /> <br /> This involves team or bonding drivers ability to dynamically<br /> change their dev-&gt;needed_headroom and/or dev-&gt;hard_header_len<br /> <br /> In this particular crash mld_newpack() allocated an skb<br /> with a too small reserve/headroom, and by the time mld_sendpack()<br /> was called, syzbot managed to attach an ip6gre device.<br /> <br /> [1]<br /> skbuff: skb_under_panic: text:ffffffff8a1d69a8 len:136 put:40 head:ffff888059bc7000 data:ffff888059bc6fe8 tail:0x70 end:0x6c0 dev:team0<br /> ------------[ cut here ]------------<br /> kernel BUG at net/core/skbuff.c:213 !<br /> <br /> skb_under_panic net/core/skbuff.c:223 [inline]<br /> skb_push+0xc3/0xe0 net/core/skbuff.c:2641<br /> ip6gre_header+0xc8/0x790 net/ipv6/ip6_gre.c:1371<br /> dev_hard_header include/linux/netdevice.h:3436 [inline]<br /> neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618<br /> neigh_output include/net/neighbour.h:556 [inline]<br /> ip6_finish_output2+0xfb3/0x1480 net/ipv6/ip6_output.c:136<br /> __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]<br /> ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:220<br /> NF_HOOK_COND include/linux/netfilter.h:307 [inline]<br /> ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247<br /> NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318<br /> mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855<br /> mld_send_cr net/ipv6/mcast.c:2154 [inline]<br /> mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71099

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()<br /> <br /> In xe_oa_add_config_ioctl(), we accessed oa_config-&gt;id after dropping<br /> metrics_lock. Since this lock protects the lifetime of oa_config, an<br /> attacker could guess the id and call xe_oa_remove_config_ioctl() with<br /> perfect timing, freeing oa_config before we dereference it, leading to<br /> a potential use-after-free.<br /> <br /> Fix this by caching the id in a local variable while holding the lock.<br /> <br /> v2: (Matt A)<br /> - Dropped mutex_unlock(&amp;oa-&gt;metrics_lock) ordering change from<br /> xe_oa_remove_config_ioctl()<br /> <br /> (cherry picked from commit 28aeaed130e8e587fd1b73b6d66ca41ccc5a1a31)
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71100

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()<br /> <br /> TID getting from ieee80211_get_tid() might be out of range of array size<br /> of sta_entry-&gt;tids[], so check TID is less than MAX_TID_COUNT. Othwerwise,<br /> UBSAN warn:<br /> <br /> UBSAN: array-index-out-of-bounds in drivers/net/wireless/realtek/rtlwifi/rtl8192cu/trx.c:514:30<br /> index 10 is out of range for type &amp;#39;rtl_tid_data [9]&amp;#39;
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026

CVE-2025-71084

Publication date:
13/01/2026
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/cm: Fix leaking the multicast GID table reference<br /> <br /> If the CM ID is destroyed while the CM event for multicast creating is<br /> still queued the cancel_work_sync() will prevent the work from running<br /> which also prevents destroying the ah_attr. This leaks a refcount and<br /> triggers a WARN:<br /> <br /> GID entry ref leak for dev syz1 index 2 ref=573<br /> WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]<br /> WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886<br /> <br /> Destroy the ah_attr after canceling the work, it is safe to call this<br /> twice.
Severity CVSS v4.0: Pending analysis
Last modification:
13/01/2026