#Cve

TheHackerWirethehackerwire
2026-02-08

🟠 CVE-2026-2187 - High (8.8)

A vulnerability was found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. It is possible to i...

🔗 thehackerwire.com/vulnerabilit

CVE Alert: CVE-2026-2187
TheHackerWirethehackerwire
2026-02-08

🟠 CVE-2026-2186 - High (8.8)

A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remo...

🔗 thehackerwire.com/vulnerabilit

CVE Alert: CVE-2026-2186
TheHackerWirethehackerwire
2026-02-08

🟠 CVE-2026-2185 - High (8.8)

A flaw has been found in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-base...

🔗 thehackerwire.com/vulnerabilit

CVE Alert: CVE-2026-2185
RedPacket SecurityRedPacketSecurity
2026-02-08
TheHackerWirethehackerwire
2026-02-08

🟠 CVE-2026-2181 - High (8.8)

A security flaw has been discovered in Tenda RX3 16.03.13.11. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-base...

🔗 thehackerwire.com/vulnerabilit

CVE Alert: CVE-2026-2181
TheHackerWirethehackerwire
2026-02-08

🟠 CVE-2026-2180 - High (8.8)

A vulnerability was identified in Tenda RX3 16.03.13.11. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. The attack can be launched remotely...

🔗 thehackerwire.com/vulnerabilit

CVE Alert: CVE-2026-2180
RedPacket SecurityRedPacketSecurity
2026-02-08
RedPacket SecurityRedPacketSecurity
2026-02-08
RedPacket SecurityRedPacketSecurity
2026-02-08
Alexandre Dulaunoyadulau@infosec.exchange
2026-02-08

Acknowledging Reality in Vulnerability Disclosure.

Every few years, vulnerability disclosure is declared settled. We are told that the ecosystem has matured, that coordinated disclosure is the answer, and that whatever remains outside this model is either irresponsible, obsolete, or simply irrelevant.

🔗 foo.be/2026/02/Acknowledging-R

#vulnerabilitymanagement #gcve #cve #cybersecurity #cvd #vulnerabilitydisclosure #open

This is my bloody personal blog, not an official statement. .

2026-02-08

🚨 New LOW CVE detected in AWS Lambda 🚨
CVE-2026-0989 impacts libxml2 in 27 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-02-08

🚨 New HIGH CVE detected in AWS Lambda 🚨
CVE-2025-15467 impacts openssl-fips-provider-latest in 40 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-02-08

🚨 New HIGH CVE detected in AWS Lambda 🚨
CVE-2025-15467 impacts openssl-fips-provider-latest in 40 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-02-08

🚨 New MEDIUM CVE detected in AWS Lambda 🚨
CVE-2026-0992 impacts libxml2 in 27 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

Lambda Watchdoglambdawatchdog
2026-02-08

🚨 New HIGH CVE detected in AWS Lambda 🚨
CVE-2025-15467 impacts openssl-fips-provider-latest in 40 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

2026-02-08

🚨 New LOW CVE detected in AWS Lambda 🚨
CVE-2026-0989 impacts libxml2 in 27 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst