Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter CloudZ RAT potentially steals OTP messages using Pheno plugin Backdoored PyTorch Lightning package drops credential stealer A rigged game: ScarCruft compromises gaming platform in a supply-chain attack Muddying the Tracks: The State-Sponsored Shadow Behind […]
A vulnerability labeled as problematic has been found in Open5GS up to 2.7.7. This vulnerability affects the function ogs_pcc_rule_install_flow_from_media in the library /lib/proto/types.c. The manipulation results in denial of service.
This vulnerability is reported as CVE-2026-8226. The attack can be launched remotely. Moreover, an exploit is present.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability marked as critical has been reported in Wavlink NU516U1 240425. This issue affects the function wzdapMesh of the file /cgi-bin/adm.cgi. This manipulation causes os command injection.
This vulnerability appears as CVE-2026-8227. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure.
A vulnerability described as critical has been identified in Wavlink NU516U1 240425. Impacted is the function advance of the file /cgi-bin/wireless.cgi. Such manipulation of the argument wlan_conf/Channel/skiplist/ieee_80211h leads to os command injection.
This vulnerability is traded as CVE-2026-8228. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure.
A vulnerability classified as critical has been found in Wavlink NU516U1 240425. The affected element is the function WifiBasic of the file /cgi-bin/wireless.cgi. Performing a manipulation of the argument AuthMethod/EncrypType results in os command injection.
This vulnerability is known as CVE-2026-8229. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure.
A vulnerability classified as critical was found in Wavlink NU516U1 240425. The impacted element is the function sys_login1 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to os command injection.
This vulnerability is handled as CVE-2026-8230. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure.
A vulnerability, which was classified as critical, has been found in CodeAstro Online Catering Ordering System 1.0. This affects an unknown function of the file /deleteorder.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-8231. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability, which was classified as problematic, was found in Dotouch XproUPF 2.0.0-release-088aa7c4. This impacts the function vlib_worker_loop in the library /usr/xpro/upf/tools/libs/libvlib.so of the component UPF Process. The manipulation results in denial of service.
This vulnerability was named CVE-2026-8232. The attack needs to be approached within the local network. There is no available exploit.
The vendor was contacted early about this disclosure.
A vulnerability has been found in Dotouch XproUPF 2.0.0-release-088aa7c4 and classified as critical. Affected is an unknown function of the component UPF. This manipulation causes improper access controls.
The identification of this vulnerability is CVE-2026-8233. The attack needs to be done within the local network. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability was found in EFM ipTIME A8004T 14.18.2. It has been rated as critical. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2026-8234. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in libexpat up to 2.8.0. Impacted is an unknown function of the component XML Handler. Executing a manipulation can lead to inefficient algorithmic complexity.
This vulnerability appears as CVE-2026-45186. The attack requires local access. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in 8421bit MiniClaw 0.8.0/0.9.0. This issue affects the function resolveSkillScriptPath of the file src/kernel.ts of the component System Command Handler. The manipulation results in os command injection.
This vulnerability is cataloged as CVE-2026-8235. The attack must originate from the local network. Furthermore, there is an exploit available.
It is best practice to apply a patch to resolve this issue.