Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-2223

Publication date:
09/04/2025
CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and<br /> Availability of engineering workstation when a malicious project file is loaded by a user from the local system.
Severity CVSS v4.0: HIGH
Last modification:
15/04/2026

CVE-2025-2440

Publication date:
09/04/2025
CWE-922: Insecure Storage of Sensitive Information vulnerability exists that could potentially lead to unauthorized<br /> access of confidential data when a malicious user, having physical access and advanced information on the file<br /> system, sets the radio in factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-2441

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of<br /> confidentiality when a malicious user, having physical access, sets the radio in factory default mode where the<br /> product does not correctly initialize all data.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-2442

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to<br /> unauthorized access which could result in the loss of confidentially, integrity and availability when a malicious<br /> user, having physical access, sets the radio to the factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2017-20197

Publication date:
09/04/2025
A vulnerability was found in propanetank Roommate-Bill-Tracking up to 288437f658fc9ee7d4b92a9da12557024d8bc55c. It has been declared as critical. This vulnerability affects unknown code of the file /includes/login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The name of the patch is b32bb1b940f82d38fb9310cd66ebe349e20a1d0a. It is recommended to apply a patch to fix this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
15/04/2026

CVE-2025-27934

Publication date:
09/04/2025
Information disclosure of authentication information in the specific service vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote unauthenticated attacker may obtain the product authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-29870

Publication date:
09/04/2025
Missing authentication for critical function vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote unauthenticated attacker may obtain the product configuration information including authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-25053

Publication date:
09/04/2025
OS command injection vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-25056

Publication date:
09/04/2025
Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If a user views a malicious page while logged in, unintended operations may be performed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-25213

Publication date:
09/04/2025
Improper restriction of rendered UI layers or frames issue exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If a user views and clicks on the content on the malicious page while logged in, unintended operations may be performed.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-27722

Publication date:
09/04/2025
Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026

CVE-2025-27797

Publication date:
09/04/2025
OS command injection vulnerability in the specific service exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
15/04/2026