Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-41764 | 9.1 CRITICAL | Unchecked role in wwwupdate.cgi |
| CVE-2025-41765 | 9.1 CRITICAL | Unchecked role in wwwupload.cgi |
| CVE-2025-41758 | 8.8 HIGH | Arbitrary Write with wwwupload.cgi |
| CVE-2025-41766 | 8.8 HIGH | Stack buffer overflow on parsing web request |
| CVE-2025-41757 | 8.8 HIGH | Arbitrary Write with ubr-restore |
| CVE-2025-41756 | 8.1 HIGH | Arbitrary Write with ubr-editfile |
| CVE-2025-41761 | 7.8 HIGH | Privilege escalation possible |
| CVE-2025-41772 | 7.5 HIGH | wwwupdate.cgi Session token in URL |
| CVE-2025-41763 | 6.5 MEDIUM | Unchecked role in wwwdnload.cgi |
| CVE-2025-41754 | 6.5 MEDIUM | Arbitrary Read with ubr-editfile |
| CVE-2025-41755 | 6.5 MEDIUM | Arbitrary Read with ubr-logread |
| CVE-2025-41762 | 6.2 MEDIUM | Secret leak with wwwdnload.cgi |
| CVE-2025-41760 | 4.9 MEDIUM | Pass filter with Empty Table |
| CVE-2025-41759 | 4.9 MEDIUM | Use of wildcard (“*” or “all”) in Block list |
No comments yet