On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive software that forces the user's network to relay Internet traffic for others, traffic that is often tied to cybercrime activity such as advertising fraud and account takeovers.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.74/5.19.16/6.0.2. This vulnerability affects unknown code of the component NFSD. Performing manipulation of the argument Count results in buffer overflow.
This vulnerability is identified as CVE-2022-50235. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.4.219/5.10.149/5.15.74/5.19.16/6.0.2. It has been classified as critical. Affected by this issue is the function unix_gc of the component af_unix. The manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2022-50234. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.10.151/5.15.75/6.0.5. Impacted is the function qcom_cpufreq_krait_name_version. The manipulation leads to buffer overflow.
This vulnerability is listed as CVE-2022-50239. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.153. The affected element is the function munmap. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2022-50240. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.15.10/6.16.1/6.17-rc1. This affects the function xsk_notify of the component net. Performing manipulation results in race condition.
This vulnerability was named CVE-2025-39796. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16.3. It has been classified as critical. This vulnerability affects the function may_use_simd of the component crypto. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2025-39804. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.16.3/6.17-rc2. It has been declared as critical. This issue affects the function ufshcd_uic_cmd_compl of the component scsi. The manipulation results in state issue.
This vulnerability is known as CVE-2025-39803. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16.3 and classified as critical. This affects the function may_use_simd in the library lib/crypto. Executing manipulation can lead to memory corruption.
This vulnerability appears as CVE-2025-39802. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.102/6.12.42/6.15.10/6.16.1. This issue affects the function xfrm_alloc_spi. The manipulation leads to excessive iteration.
This vulnerability is traded as CVE-2025-39797. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in ZIRA WBRM 7.0 and classified as critical. Affected by this vulnerability is the function referenceLookupsByTableNameAndColumnName. Performing manipulation results in sql injection.
This vulnerability is cataloged as CVE-2025-56401. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Xtooltech Xtool AnyScan Android Application up to 4.40.40. Affected by this issue is some unknown functionality of the component SSL Handler. Performing manipulation results in improper certificate validation.
This vulnerability is identified as CVE-2025-63432. The attack can be initiated remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, was found in Xtooltech Xtool AnyScan App up to 4.40.40 on Android. This affects an unknown part. Executing manipulation can lead to use of hard-coded cryptographic key
.
This vulnerability is tracked as CVE-2025-63433. The attack can be launched remotely. No exploit exists.
A vulnerability labeled as critical has been found in GL-Inet GL-AXT1800 4.7.0. This issue affects some unknown processing of the component OTA Update. Such manipulation leads to improper certificate validation.
This vulnerability is uniquely identified as CVE-2025-44018. The attack can be launched remotely. No exploit exists.
A vulnerability has been found in Xtooltech Xtool AnyScan App up to 4.40.40 on Android and classified as problematic. This vulnerability affects unknown code of the component Update Handler. The manipulation leads to download of code without integrity check.
This vulnerability is listed as CVE-2025-63434. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Xtooltech Xtool AnyScan App 4.40.40 on Android and classified as critical. This issue affects some unknown processing. The manipulation results in missing authentication.
This vulnerability is cataloged as CVE-2025-63435. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Marco Milesi Telegram Bot & Channel Plugin up to 4.1 on WordPress. It has been declared as problematic. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2025-13068. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Keylime. It has been classified as problematic. Impacted is an unknown function of the component Trusted Platform Module. This manipulation causes use of multiple resources with duplicate identifier.
This vulnerability is registered as CVE-2025-13609. Remote exploitation of the attack is possible. No exploit is available.