Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-8765

Publication date:
09/08/2025
A vulnerability classified as problematic was found in Datacom DM955 5GT 1200 825.8010.00. Affected by this vulnerability is an unknown functionality of the component Wireless Basic Settings. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025

CVE-2025-8763

Publication date:
09/08/2025
A vulnerability was found in Ruijie EG306MG 3.0(1)B11P309. It has been rated as problematic. This issue affects some unknown processing of the file /etc/strongswan.conf of the component strongSwan. The manipulation of the argument i_dont_care_about_security_and_use_aggressive_mode_psk leads to missing encryption of sensitive data. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025

CVE-2025-8759

Publication date:
09/08/2025
A vulnerability was found in TRENDnet TN-200 1.02b02. It has been declared as problematic. This vulnerability affects unknown code of the component Lighttpd. The manipulation of the argument secdownload.secret with the input neV3rUseMe leads to use of hard-coded cryptographic key<br /> . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025

CVE-2025-8758

Publication date:
09/08/2025
A vulnerability was found in TRENDnet TEW-822DRE FW103B02. It has been classified as problematic. This affects an unknown part of the component vsftpd. The manipulation leads to least privilege violation. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
09/08/2025

CVE-2025-8756

Publication date:
09/08/2025
A vulnerability has been found in TDuckCloud tduck-platform up to 5.1 and classified as critical. Affected by this vulnerability is the function preHandle of the file /manage/ of the component com.tduck.cloud.api.web.interceptor.AuthorizationInterceptor. The manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025

CVE-2025-8757

Publication date:
09/08/2025
A vulnerability was found in TRENDnet TV-IP110WN 1.2.2 and classified as problematic. Affected by this issue is some unknown functionality of the file /server/boa.conf of the component Embedded Boa Web Server. The manipulation leads to least privilege violation. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: HIGH
Last modification:
09/08/2025

CVE-2022-50233

Publication date:
09/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: eir: Fix using strlen with hdev-&gt;{dev_name,short_name}<br /> <br /> Both dev_name and short_name are not guaranteed to be NULL terminated so<br /> this instead use strnlen and then attempt to determine if the resulting<br /> string needs to be truncated or not.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2025

CVE-2024-58238

Publication date:
09/08/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test<br /> <br /> This fixes the tx timeout issue seen while running a stress test on<br /> btnxpuart for couple of hours, such that the interval between two HCI<br /> commands coincide with the power save timeout value of 2 seconds.<br /> <br /> Test procedure using bash script:<br /> <br /> hciconfig hci0 up<br /> //Enable Power Save feature<br /> hcitool -i hci0 cmd 3f 23 02 00 00<br /> while (true)<br /> do<br /> hciconfig hci0 leadv<br /> sleep 2<br /> hciconfig hci0 noleadv<br /> sleep 2<br /> done<br /> <br /> Error log, after adding few more debug prints:<br /> Bluetooth: btnxpuart_queue_skb(): 01 0A 20 01 00<br /> Bluetooth: hci0: Set UART break: on, status=0<br /> Bluetooth: hci0: btnxpuart_tx_wakeup() tx_work scheduled<br /> Bluetooth: hci0: btnxpuart_tx_work() dequeue: 01 0A 20 01 00<br /> Can&amp;#39;t set advertise mode on hci0: Connection timed out (110)<br /> Bluetooth: hci0: command 0x200a tx timeout<br /> <br /> When the power save mechanism turns on UART break, and btnxpuart_tx_work()<br /> is scheduled simultaneously, psdata-&gt;ps_state is read as PS_STATE_AWAKE,<br /> which prevents the psdata-&gt;work from being scheduled, which is responsible<br /> to turn OFF UART break.<br /> <br /> This issue is fixed by adding a ps_lock mutex around UART break on/off as<br /> well as around ps_state read/write.<br /> btnxpuart_tx_wakeup() will now read updated ps_state value. If ps_state is<br /> PS_STATE_SLEEP, it will first schedule psdata-&gt;work, and then it will<br /> reschedule itself once UART break has been turned off and ps_state is<br /> PS_STATE_AWAKE.<br /> <br /> Tested above script for 50,000 iterations and TX timeout error was not<br /> observed anymore.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2025

CVE-2025-8755

Publication date:
09/08/2025
A vulnerability was found in macrozheng mall up to 1.0.3 and classified as problematic. This issue affects the function detail of the file UmsMemberController.java of the component com.macro.mall.portal.controller. The manipulation of the argument orderId leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025

CVE-2025-7726

Publication date:
09/08/2025
The The7 theme for WordPress is vulnerable to Stored Cross-Site Scripting via its lightbox rendering code in all versions up to, and including, 12.6.0 due to insufficient input sanitization and output escaping. The theme’s JavaScript reads user-supplied &amp;#39;title&amp;#39; and &amp;#39;data-dt-img-description&amp;#39; attributes directly via jQuery.attr(), concatenates them into an HTML string, and inserts that string into the DOM using methods such as jQuery.html() without escaping or filtering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity CVSS v4.0: Pending analysis
Last modification:
09/08/2025

CVE-2025-8753

Publication date:
09/08/2025
A vulnerability, which was classified as critical, has been found in linlinjava litemall up to 1.8.0. Affected by this issue is the function delete of the file /admin/storage/delete of the component File Handler. The manipulation of the argument key leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025

CVE-2025-7020

Publication date:
09/08/2025
An incorrect encryption implementation vulnerability exists in the system log dump feature of BYD&amp;#39;s DiLink 3.0 OS (e.g. in the model ATTO3). An attacker with physical access to the vehicle can bypass the encryption of log dumps on the In-Vehicle Infotainment (IVI) unit&amp;#39;s storage. This allows the attacker to access and read system logs containing sensitive data, including personally identifiable information (PII) and location data.<br /> <br /> This vulnerability was introduced in a patch intended to fix CVE-2024-54728.
Severity CVSS v4.0: MEDIUM
Last modification:
09/08/2025