A vulnerability was found in Ugreen DH2100+ up to 5.3.0 and classified as critical. This affects an unknown function of the component USB Handler. Such manipulation leads to symlink following.
This vulnerability is referenced as CVE-2025-14693. The attack can be executed directly on the physical device. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Mayan EDMS up to 4.10.1 and classified as problematic. The impacted element is an unknown function of the file /authentication/. This manipulation causes open redirect.
The identification of this vulnerability is CVE-2025-14692. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The affected component should be upgraded.
The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
A vulnerability, which was classified as problematic, was found in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting.
This vulnerability was named CVE-2025-14691. The attack may be performed from remote. In addition, an exploit is available.
You should upgrade the affected component.
The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
A vulnerability was found in itsourcecode Student Management System 1.0. It has been rated as critical. Impacted is an unknown function of the file /addrecord.php. This manipulation of the argument ID causes sql injection.
This vulnerability is registered as CVE-2025-14653. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability categorized as critical has been discovered in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2025-14654. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability was found in MartialBE one-hub up to 0.14.27. It has been classified as critical. This vulnerability affects unknown code of the file docker-compose.yml. The manipulation of the argument SESSION_SECRET leads to use of hard-coded cryptographic key
.
This vulnerability is listed as CVE-2025-14651. The attack may be initiated remotely. In addition, an exploit is available.
It is recommended to change the configuration settings.
The code maintainer recommends (translated from Chinese): "The default docker-compose example file is not recommended for production use. If you intend to use it in production, please carefully check and modify every configuration and environment variable yourself!"
A vulnerability was found in itsourcecode Online Cake Ordering System 1.0. It has been declared as critical. This issue affects some unknown processing of the file /admindetail.php?action=edit. The manipulation of the argument ID results in sql injection.
This vulnerability is cataloged as CVE-2025-14652. The attack may be launched remotely. Furthermore, there is an exploit available.