Offensive Sequence

OffSeq is a cybersecurity company enhancing organizational digital resilience through comprehensive protection against evolving cyber threats. We offer specialized services for businesses of all sizes, with particular expertise in Baltic, Scandinavian, Belgian markets and EU regulatory compliance.

Offensive Sequenceoffseq@infosec.exchange
2026-03-17

🚨 CVE-2026-23489 (CRITICAL, CVSS 9.1): GLPI 'fields' plugin (<1.23.3) allows privileged users to execute arbitrary PHP code (RCE risk). Patch to 1.23.3+, review permissions, and monitor activity. radar.offseq.com/threat/cve-20 #OffSeq #GLPI #CVE202623489 #infosec

Critical threat: CVE-2026-23489: CWE-20: Improper Input Validation in pluginsGLPI fields
Offensive Sequenceoffseq@infosec.exchange
2026-03-17

🚨 CRITICAL: CVE-2026-4254 in Tenda AC8 (fw ≤16.03.50.11) enables remote stack buffer overflow via /goform/SysToolChangePwd. Public exploit out — isolate & monitor! No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE20264254 #RouterSecurity #Vuln

Critical threat: CVE-2026-4254: Stack-based Buffer Overflow in Tenda AC8
Offensive Sequenceoffseq@infosec.exchange
2026-03-17

🚨 CRITICAL: CVE-2026-32267 in Craft CMS (4.x <4.17.6, 5.x <5.9.12) — incorrect auth allows privilege escalation to admin via shared URLs. Upgrade ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CraftCMS #CVE202632267 #Vulnerability

Critical threat: CVE-2026-32267: CWE-863: Incorrect Authorization in craftcms cms
Offensive Sequenceoffseq@infosec.exchange
2026-03-17

Chamilo LMS < 1.11.34 has a CRITICAL SQL injection vuln (CVE-2026-28430, CVSS 9.3). Unauth attackers can hijack admin accounts & access PII. Upgrade to 1.11.34 ASAP. No public exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Chamilo #InfoSec

Critical threat: CVE-2026-28430: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Inj
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

🚨 CRITICAL: CVE-2026-4182 in D-Link DIR-816 (v1.10CNB05) — stack buffer overflow in /goform/form2Wl5RepeaterStep2.cgi enables remote code execution. No patch, public exploit exists. Replace or isolate devices now! radar.offseq.com/threat/cve-20 #OffSeq #DLink #IoTSecurity

Critical threat: CVE-2026-4182: Stack-based Buffer Overflow in D-Link DIR-816
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

🔎 CVE-2026-4183 (CRITICAL, CVSS 9.3): D-Link DIR-816 (v1.10CNB05) stack buffer overflow via /goform/form2WlanBasicSetup.cgi. Exploit code public, no patch. Replace or isolate devices ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE20264183 #IoTSecurity

Critical threat: CVE-2026-4183: Stack-based Buffer Overflow in D-Link DIR-816
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

🛡️ HIGH severity alert: CVE-2026-4255 in TR-VISION HOME (≤2.0.5) enables DLL hijacking; local attackers can escalate privileges via side-loading. Restrict write access & monitor for rogue DLLs. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #CVE20264255 #Windows

High threat: CVE-2026-4255: CWE-829 Inclusion of functionality from untrusted control sphere in thermalright TR-V
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

🔒 CVE-2026-31386 (HIGH): All LiteSpeed OpenLiteSpeed/LSWS Enterprise versions are vulnerable to OS command injection by admins. No exploits seen yet, but impact = full system compromise. Tighten admin controls & monitor! radar.offseq.com/threat/cve-20 #OffSeq #LiteSpeed #Infosec

High threat: CVE-2026-31386: Improper neutralization of special elements used in an OS command ('OS Command Injec
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

🚨 CVE-2026-4212 (HIGH, CVSS 8.7): D-Link DNS-120 NAS stack buffer overflow in /cgi-bin/download_mgr.cgi enables remote, unauthenticated compromise. Patch or restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #DLink #BlueTeam

High threat: CVE-2026-4212: Stack-based Buffer Overflow in D-Link DNS-120
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

CVE-2026-4206: MEDIUM severity command injection in D-Link DNS-120 NAS (20260205). Remote, unauthenticated exploit possible — PoC public, patch ASAP or restrict access. Monitor for suspicious /cgi-bin/dsk_mgr.cgi activity. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln

Medium threat: CVE-2026-4206: Command Injection in D-Link DNS-120
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

CVE-2026-4201 (MEDIUM, CVSS 6.9) in glowxq-oj allows remote, unauthenticated file uploads — risk of code execution. No patch, public exploit exists. Restrict upload access, validate files, monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberSecurity

Medium threat: CVE-2026-4201: Unrestricted Upload in glowxq glowxq-oj
Offensive Sequenceoffseq@infosec.exchange
2026-03-16

CVE-2026-4188: HIGH severity stack-based buffer overflow in D-Link DIR-619L (2.06B01). Allows remote, unauthenticated RCE. Device is unsupported — replace or strictly isolate! Exploit is public. More: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #DLink #InfoSec

High threat: CVE-2026-4188: Stack-based Buffer Overflow in D-Link DIR-619L
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

⚠️ MEDIUM severity: Tiandy Easy7 Integrated Management Platform 7.17.0 has a missing authentication bug (CVE-2026-4187) in Device Identifier Handler. Public exploit exists. No vendor fix yet — review exposure & restrict access. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Tiandy #Cybersecurity

Medium threat: CVE-2026-4187: Missing Authentication in Tiandy Easy7 Integrated Management Platform
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

⚠️ CRITICAL: D-Link DIR-816 (1.10CNB05) stack-based buffer overflow via pskValue in /goform/form2Wl5BasicSetup.cgi. Exploit is public, remote code execution possible. Device is EOL — isolate or replace! CVE-2026-4184 radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln

Critical threat: CVE-2026-4184: Stack-based Buffer Overflow in D-Link DIR-816
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

🚨 CVE-2026-1947: HIGH severity in NEX-Forms – Ultimate Forms Plugin for WordPress (all versions ≤9.1.9). Unauthenticated attackers can overwrite form entries via IDOR. Disable plugin or restrict access ASAP! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #InfoSec

High threat: CVE-2026-1947: CWE-639 Authorization Bypass Through User-Controlled Key in webaways NEX-Forms – Ulti
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

⚠️ HIGH-severity: CVE-2026-4167 stack overflow in Belkin F9K1122 v1.00.33. Remote attackers can exploit /goform/formReboot — no patch, public exploit out. Restrict access, monitor for attack attempts. radar.offseq.com/threat/cve-20 #OffSeq #CVE20264167 #IoTSecurity

High threat: CVE-2026-4167: Stack-based Buffer Overflow in Belkin F9K1122
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

🚩 HIGH severity: CVE-2026-4172 in TRENDnet TEW-632BRP (v1.010B32) — stack-based buffer overflow in /ping_response.cgi (ping_ipaddr). Public exploit, no patch. Isolate, restrict access, and monitor now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #RouterVuln

High threat: CVE-2026-4172: Stack-based Buffer Overflow in TRENDnet TEW-632BRP
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

⚠️ CRITICAL: CVE-2026-4163 in Wavlink WL-WN579A3 (220323) enables remote unauthenticated command injection via /cgi-bin/wireless.cgi. Exploit is public — restrict remote admin, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity

Critical threat: CVE-2026-4163: Command Injection in Wavlink WL-WN579A3
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

🚩 CVE-2026-4164 (CRITICAL): Wavlink WL-WN578W2 (221110) is vulnerable to remote command injection via POST to /cgi-bin/wireless.cgi. Public exploit is out. Restrict access, monitor logs, and upgrade ASAP. radar.offseq.com/threat/cve-20 #OffSeq #CVE #RouterSecurity #IoTSecurity

Critical threat: CVE-2026-4164: Command Injection in Wavlink WL-WN578W2
Offensive Sequenceoffseq@infosec.exchange
2026-03-15

🔴 CRITICAL: CVE-2026-4170 in Topsec TopACM 3.0 enables unauthenticated OS command injection via 'template_path' in /nmc_sync.php. No patch, public exploit out. Restrict access, deploy WAF/IDS, monitor logs urgently! radar.offseq.com/threat/cve-20 #OffSeq #vuln #cybersecurity

Critical threat: CVE-2026-4170: OS Command Injection in Topsec TopACM

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst