A vulnerability classified as problematic was found in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2026-1416. The attack must be initiated from a local position. Furthermore, there is an exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability classified as problematic has been found in GPAC up to 2.4.0. Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c. The manipulation of the argument Name leads to null pointer dereference.
This vulnerability is listed as CVE-2026-1415. The attack must be carried out locally. In addition, an exploit is available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability described as critical has been identified in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection.
This vulnerability is tracked as CVE-2026-1414. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability marked as critical has been reported in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection.
This vulnerability is identified as CVE-2026-1413. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability labeled as critical has been found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. The impacted element is an unknown function of the file /fort/audit/get_clip_img of the component HTTP POST Request Handler. Such manipulation of the argument frame/dirno leads to command injection.
This vulnerability is referenced as CVE-2026-1412. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability identified as critical has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. The affected element is an unknown function of the component UART Interface. This manipulation causes improper access controls.
The identification of this vulnerability is CVE-2026-1411. It is feasible to perform the attack on the physical device. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability categorized as critical has been discovered in Beetel 777VR1 up to 01.00.09/01.00.09_55. Impacted is an unknown function of the component UART Interface. The manipulation results in missing authentication.
This vulnerability was named CVE-2026-1410. An attack on the physical device is feasible. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Beetel 777VR1 up to 01.00.09/01.00.09_55. It has been rated as problematic. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is uniquely identified as CVE-2026-1409. It is possible to launch the attack on the physical device. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Beetel 777VR1 up to 01.00.09/01.00.09_55. It has been declared as critical. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements.
This vulnerability is handled as CVE-2026-1408. The physical device can be targeted for the attack. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Beetel 777VR1 up to 01.00.09/01.00.09_55. It has been classified as problematic. This affects an unknown part of the component UART Interface. Performing a manipulation results in information disclosure.
This vulnerability is known as CVE-2026-1407. The attack may be carried out on the physical device. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.