#OffSeq

Offensive Sequenceoffseq@infosec.exchange
2025-12-16

đź”´ Critical auth bypass flaws in Fortinet FortiGate appliances now exploited in the wild! Full device compromise possible without auth. Patch urgently, restrict management access, and monitor for suspicious activity. radar.offseq.com/threat/in-the #OffSeq #Fortinet #Vuln

Critical threat: In-the-Wild Exploitation of Fresh Fortinet Flaws Begins
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

🚨 CVE-2025-68068: Critical RFI in Stockholm WP theme (≤9.14.1) enables unauthenticated remote code execution. Patch or disable theme, harden PHP configs, and monitor for abuse. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #InfoSec #RFI

Critical threat: CVE-2025-68068: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remo
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

🚨 CRITICAL: Active 0-days in Apple OS, WinRAR, .NET & LastPass, incl. RCE & OAuth phishing. Patch immediately, enforce MFA, and boost user training. Watch for pre-patch exploits — attackers are moving fast! radar.offseq.com/threat/weekly #OffSeq #CyberThreats #Phishing #RCE

Critical threat: ⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

⚠️ CVE-2025-14252: Advantech SUSI driver (≤5.0.24335) has HIGH-severity improper access control. Local attackers can escalate privileges & execute arbitrary code—industrial systems are at risk. Restrict access & monitor activity! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #ICS

High threat: CVE-2025-14252: Vulnerability in Advantech SUSI
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

⚠️ CRITICAL: CVE-2025-65213 in MooreThreads torch_musa (all versions) allows RCE via unsafe pickle.load() in compare_tool functions. Audit usage & block untrusted pickle files ASAP! More info: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #AIsecurity

Critical threat: CVE-2025-65213: n/a
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

CRITICAL: CVE-2025-67744 in ThinkInAIXYZ DeepChat (<0.5.3) allows remote code execution via unsafe Mermaid diagram rendering & exposed Electron IPC. User interaction needed, no auth required. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #DeepChat #Vuln #RCE

Critical threat: CVE-2025-67744: CWE-94: Improper Control of Generation of Code ('Code Injection') in ThinkInAIXYZ de
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

🤖 New autonomous code analyzer outperforms humans in OSS zero-day discovery! Severity: CRITICAL. No CVE yet, but European orgs using OSS should bolster code auditing, monitoring, and patch readiness. Full details: radar.offseq.com/threat/autono #OffSeq #ZeroDay #OSS #Infosec

Critical threat: Autonomous code analyzer beats all human teams at OSS zero-day competition
Offensive Sequenceoffseq@infosec.exchange
2025-12-16

🚨 FreePBX patches CRITICAL SQLi, file-upload, and AUTHTYPE bypass flaws enabling unauthenticated RCE. No CVE yet. All versions at risk—patch ASAP! Restrict admin interfaces and monitor logs. More: radar.offseq.com/threat/freepb #OffSeq #FreePBX #VoIP #RCE #Infosec

Critical threat: FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

⚠️ CRITICAL: CVE-2025-14707 in Shiguangwu sgwbox N3 v2.0.25 enables unauthenticated RCE via the DOCKER feature. No patch, public exploit available. Restrict network access, monitor logs, and disable if possible. radar.offseq.com/threat/cve-20 #OffSeq #CommandInjection #Infosec

Critical threat: CVE-2025-14707: Command Injection in Shiguangwu sgwbox N3
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

🛑 CRITICAL: CVE-2025-14708 in Shiguangwu sgwbox N3 v2.0.25 allows remote buffer overflow via WIREDCFGGET—public exploit, no patch. Segment networks, restrict access, and monitor for attacks. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202514708 #infosec

Critical threat: CVE-2025-14708: Buffer Overflow in Shiguangwu sgwbox N3
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

🚨 CVE-2025-14709 (CRITICAL, 9.3): Shiguangwu sgwbox N3 v2.0.25 has a buffer overflow in WIRELESSCFGGET, allowing unauth RCE. No patch; public exploit code available. Segment & monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE202514709 #IoTSecurity #Infosec

Critical threat: CVE-2025-14709: Buffer Overflow in Shiguangwu sgwbox N3
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

🚨 CVE-2025-14706 (CRITICAL, CVSS 9.3): Shiguangwu sgwbox N3 v2.0.25 has an unpatched remote command injection in /usr/sbin/http_eshell_server. Public exploit, no vendor fix. Isolate, restrict, & monitor now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202514706 #Infosec #NetworkSecurity

Critical threat: CVE-2025-14706: Command Injection in Shiguangwu sgwbox N3
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

🚨 HIGH severity: PayPal subscriptions are being abused to send fake purchase emails in EU, leading to credential & financial theft. No CVE. Defenders: enhance email filtering, train users, enforce MFA, verify via PayPal directly. radar.offseq.com/threat/beware #OffSeq #Phishing #PayPal

High threat: Beware: PayPal subscriptions abused to send fake purchase emails
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

⚠️ HIGH severity: CVE-2025-67900 in NXLog Agent <6.11 lets local attackers alter OpenSSL configs via OPENSSL_CONF, risking confidentiality & integrity. Patch to 6.11+ & restrict local access! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #InfoSec

High threat: CVE-2025-67900: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in NXLog NXLog Agen
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

🚨 CVE-2025-14693 HIGH: Symlink following in Ugreen DH2100+ (≤5.3.0) lets attackers with physical access compromise the device. No patch available; restrict access & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Ugreen #OTSecurity

High threat: CVE-2025-14693: Symlink Following in Ugreen DH2100+
Offensive Sequenceoffseq@infosec.exchange
2025-12-15

⚠️ CVE-2025-14665 (CRITICAL): Stack-based buffer overflow in Tenda WH450 v1.0.0.18 via /goform/DhcpListClient 'page' param. Remote, unauthenticated code execution possible. Exploit is public. Isolate & monitor now! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity #Infosec

Critical threat: CVE-2025-14665: Stack-based Buffer Overflow in Tenda WH450
Offensive Sequenceoffseq@infosec.exchange
2025-12-14

⚠️ CISA warns of HIGH-severity RCE in Sierra Wireless AirLink ALEOS routers (CVE-2018-4063), actively exploited in the wild. End-of-support complicates patching—prioritize isolation, access control, and monitoring. radar.offseq.com/threat/cisa-a #OffSeq #ThreatIntel #OTSecurity

High threat: CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
Offensive Sequenceoffseq@infosec.exchange
2025-12-14

UK ICO fined LastPass £1.2M after its 2022 breach (HIGH severity). Euro orgs using LastPass may face credential exposure—review MFA, audit passwords, and monitor activity. No active exploits seen. Stay alert! Details: radar.offseq.com/threat/uks-ic #OffSeq #DataBreach #PasswordManager

High threat: UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach
Offensive Sequenceoffseq@infosec.exchange
2025-12-14

⚠️ CVE-2025-12696 (HIGH): HelloLeads CRM Form Shortcode ≤1.0 for WordPress is vulnerable to unauthenticated config reset via missing auth & CSRF checks. Restrict access & monitor logs until patched! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #InfoSec

High threat: CVE-2025-12696: CWE-862 Missing Authorization in HelloLeads CRM Form Shortcode
Offensive Sequenceoffseq@infosec.exchange
2025-12-14

⚠️ CVE-2025-13126: HIGH risk SQL Injection in wpForo Forum plugin for WordPress (≤2.4.12). Attackers can extract sensitive data without auth. Mitigate with WAF & input validation until patch is out. Info: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLInjection

High threat: CVE-2025-13126: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Inje

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst