Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-2442

Publication date:
09/04/2025
CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to<br /> unauthorized access which could result in the loss of confidentially, integrity and availability when a malicious<br /> user, having physical access, sets the radio to the factory default mode.
Severity CVSS v4.0: MEDIUM
Last modification:
09/04/2025

CVE-2017-20197

Publication date:
09/04/2025
A vulnerability was found in propanetank Roommate-Bill-Tracking up to 288437f658fc9ee7d4b92a9da12557024d8bc55c. It has been declared as critical. This vulnerability affects unknown code of the file /includes/login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The name of the patch is b32bb1b940f82d38fb9310cd66ebe349e20a1d0a. It is recommended to apply a patch to fix this issue.
Severity CVSS v4.0: MEDIUM
Last modification:
09/04/2025

CVE-2025-27934

Publication date:
09/04/2025
Information disclosure of authentication information in the specific service vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote unauthenticated attacker may obtain the product authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-29870

Publication date:
09/04/2025
Missing authentication for critical function vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote unauthenticated attacker may obtain the product configuration information including authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-25053

Publication date:
09/04/2025
OS command injection vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-25056

Publication date:
09/04/2025
Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If a user views a malicious page while logged in, unintended operations may be performed.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-25213

Publication date:
09/04/2025
Improper restriction of rendered UI layers or frames issue exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If a user views and clicks on the content on the malicious page while logged in, unintended operations may be performed.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-27722

Publication date:
09/04/2025
Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-27797

Publication date:
09/04/2025
OS command injection vulnerability in the specific service exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-23407

Publication date:
09/04/2025
Incorrect privilege assignment vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT &amp;#39;AC-WPS-11ac series&amp;#39;. If exploited, a remote attacker who can log in to the product may alter the settings without appropriate privileges.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-20952

Publication date:
09/04/2025
Improper access control in Mdecservice prior to SMR Apr-2025 Release 1 allows local attackers to access arbitrary files with system privilege.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2025

CVE-2025-3442

Publication date:
09/04/2025
This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
Severity CVSS v4.0: MEDIUM
Last modification:
09/04/2025