eSIM vulnerability discovered. That's gonna be a rough one to fix if it is genuinely exploitable.
eSIM vulnerability discovered. That's gonna be a rough one to fix if it is genuinely exploitable.
FortiWeb взломан изнутри: SQL-инъекция 9.6/10 позволяет писать код в БД
В компоненте Fabric Connector (интеграция продуктов Fortinet) обнаружена (https://fortiguard.fortinet.com/psirt/FG-IR-25-151) критическая уязвимость CVE-2025-25257 (9.6/10 CVSS). Атакующий без авторизации мог:
→ Выполнять произвольные SQL-запросы через поддельный Bearer-токен в заголовке Authorization;
→ Использовать SELECT... INTO OUTFILE для записи вредоносного кода на диск;
→ Запускать код через Python, получая полный контроль над системой (от имени пользователя mysql).
Уязвимые версии:
FortiWeb 7.6.0–7.6.3, 7.4.0–7.4.7, 7.2.0–7.2.10, 7.0.0–7.0.10.
Решение: Срочно обновиться до 7.6.4, 7.4.8, 7.2.11 или 7.0.11. До патча — отключить веб-интерфейсы HTTP/HTTPS.
Как починили?
Fortinet заменила небезопасные форматные строки на подготовленные выражения (prepared statements), блокирующие SQL-инъекции. Уязвимость нашёл Кентаро Кавана (GMO Cybersecurity) — эксперт по взлому Cisco.
Researchers Jailbreak Elon Musk’s Grok-4 AI Within 48 Hours of Launch https://hackread.com/researchers-jailbreak-grok-4-ai-48-hours-of-launch/ #ArtificialIntelligence #Cybersecurity #Vulnerability #NeuralTrust #Jailbreak #Security #ElonMusk #twitter #Grok4 #xAI #AI #X
WinRAR Zero-Day Exploit Allegedly on Sale for $80,000 https://dailydarkweb.net/winrar-zero-day-exploit-allegedly-on-sale-for-80000/ #Vulnerability #CyberSecurity #vulnerability #exploit #ZeroDay #WinRAR #RCE
Wrapped up an energising Vulnerability Lookup workshop during @circl’s Virtual Summer School 2025.
Video and slides are now available.
Big thanks to everyone who joined the discussions.
Video https://youtu.be/imkPqA-1mVE
Slides https://www.vulnerability-lookup.org/files/events/2025/VSS-2025-VulnerabilityLookup.pdf
Researchers jailbroke #ElonMusk’s Grok-4 AI just 48 hours after launch using Echo Chamber and Crescendo techniques, tricking it into giving malicious commands.
https://hackread.com/researchers-jailbreak-grok-4-ai-48-hours-of-launch/
Wing FTP Server Vulnerability Actively Exploited – 2000+ Servers Exposed Online https://cybersecuritynews.com/wing-ftp-server-vulnerability-exploited/ #CyberSecurityNews #VulnerabilityNews #cybersecuritynews #CyberSecurity #cybersecurity #vulnerability
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment https://cybersecuritynews.com/gigabyte-uefi-firmware-vulnerability/ #CyberSecurityNews #cybersecuritynews #CyberSecurity #Vulnerability #cybersecurity #vulnerability
Gigabyte UEFI Firmware Vulnerability Allows Code Execution in SMM Privileged Mode https://gbhackers.com/gigabyte-uefi-firmware-vulnerability/ #CVE/vulnerability #CyberSecurityNews #Vulnerabilities #cybersecurity #Vulnerability
CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution – Source: socprime.com https://ciso2ciso.com/cve-2025-25257-vulnerability-critical-sql-injection-in-fortinet-fortiweb-enables-unauthenticated-remote-code-execution-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE #rce
Google Gemini Tricked Into Showing Phishing Message Hidden in Email https://www.securityweek.com/google-gemini-tricked-into-showing-phishing-message-hidden-in-email/ #ArtificialIntelligence #promptinjection #vulnerability #GoogleGemini #AIjailbreak
Google Gemini Tricked Into Showing Phishing Message Hidden in Email https://www.securityweek.com/google-gemini-tricked-into-showing-phishing-message-hidden-in-email/ #ArtificialIntelligence #promptinjection #vulnerability #GoogleGemini #AIjailbreak
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction https://cybersecuritynews.com/rendershock-0-click-vulnerability/ #CyberSecurityNews #cybersecuritynews #CyberSecurity #Vulnerability #cybersecurity #vulnerability #ZeroDay
If you’re using #Immich, a self-hosted photo and video management solution check for an update if you’re not running on the latest version, because prior to 1.132.0, Immich is vulnerable to account hijacking through oauth2.
https://github.com/immich-app/immich/security/advisories/GHSA-3832-6r8h-9cfm
CVSSv4:7.3
CVE-2025-43856, CWE-303
#security #cybersecurity #vulnerability
Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257) https://www.helpnetsecurity.com/2025/07/14/exploits-for-unauthenticated-fortiweb-rce-are-public-so-patch-quickly-cve-2025-25257/ #webapplicationsecurity #vulnerability #Don'tmiss #WatchTowr #Hotstuff #Fortinet #exploit #Rapid7 #News #PoC
638 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of June 30, 2025
https://www.cisa.gov/news-events/bulletins/sb25-188
#CVE #CVEID #CVSS #CWE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment https://www.securityweek.com/flaws-in-gigabyte-firmware-allow-security-bypass-backdoor-deployment/ #EndpointSecurity #vulnerability #secureboot #backdoor #firmware #Gigabyte
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment https://www.securityweek.com/flaws-in-gigabyte-firmware-allow-security-bypass-backdoor-deployment/ #EndpointSecurity #vulnerability #secureboot #backdoor #firmware #Gigabyte
Critical buffer overflow flaw reported in D-Link DIR-825 routers
Security researchers have discovered a critical stack-based buffer overflow vulnerability in D-Link DIR-825 Rev.
When the router processes subsequent requests to ASP pages containing specific script tags, the stored language value is retrieved and processed through multiple functions, ultimately leading to a stack overflow condition.
js”></script> is requested, the router attempts to process the stored language value, leading to a stack overflow in the sub_40bFC4 function.
The researcher provided a detailed proof of concept demonstrating the vulnerability’s exploitation.
cgi with a carefully crafted payload containing an extremely long language parameter value.
**If you have a D-Link DIR-825 router, isolate its web interface from any public networks and block external access since this model is no longer supported with security updates. Consider replacing the router since it won't be getting any patches. And other flaws will be found.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-buffer-overflow-flaw-reported-in-d-link-dir-825-routers-4-f-1-t-h/gD2P6Ple2L