A vulnerability was found in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533. It has been classified as critical. Affected is the function set_stcreenen_deabled_status/get_status of the file /f/service/controlDevice of the component jdcapp_rpc. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2026-2563. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533 and classified as critical. This impacts the function cast_streen of the file /jdcapi of the component jdcweb_rpc. Executing a manipulation of the argument File can lead to privilege escalation.
This vulnerability appears as CVE-2026-2562. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in JingDong JD Cloud Box AX6600 up to 4.5.1.r4533 and classified as critical. This affects the function web_get_ddns_uptime of the file /jdcapi of the component jdcweb_rpc. Performing a manipulation results in privilege escalation.
This vulnerability is reported as CVE-2026-2561. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in kalcaddle kodbox up to 1.64.05. The impacted element is the function run of the file plugins/fileThumb/lib/VideoResize.class.php of the component Media File Preview Plugin. Such manipulation of the argument localFile leads to os command injection.
This vulnerability is documented as CVE-2026-2560. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Linux Kernel up to 6.17.2 and classified as critical. This issue affects the function crypto_acomp_streams of the component crypto. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2025-40063. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. The impacted element is the function qm_diff_regs of the component crypto. This manipulation causes improper initialization.
This vulnerability is handled as CVE-2025-40062. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.52/6.17.2 and classified as critical. This affects the function ecap_slads of the component iommu. Executing a manipulation can lead to state issue.
This vulnerability is registered as CVE-2025-40058. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.111/6.12.52/6.17.2. This vulnerability affects the function do_task of the component rxe. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-40061. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2. The affected element is the function etm_setup_aux of the component TRBE Driver. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-40060. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.52/6.17.2. Impacted is the function devm_kzalloc of the component coresight. The manipulation of the argument return leads to unchecked return value.
This vulnerability is traded as CVE-2025-40059. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 and classified as critical. The impacted element is the function user_cluster_connect of the component ocfs2. Performing a manipulation results in double free.
This vulnerability is cataloged as CVE-2025-40055. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. It has been rated as critical. This vulnerability affects the function copy_to_iter of the component vhost. Performing a manipulation of the argument return results in unchecked return value.
This vulnerability is reported as CVE-2025-40056. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.52/6.17.2. This issue affects the function max_vclocks of the component ptp. Executing a manipulation of the argument max can lead to privilege escalation.
This vulnerability appears as CVE-2025-40057. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.