A new Mirai-based botnet malware named 'ShadowV2' has been observed targeting IoT devices from D-Link, TP-Link, and other vendors with exploits for known vulnerabilities. [...]
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.43/6.16.3/6.17-rc2. Affected by this issue is the function write_iter of the component netfs. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-39723. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.40/6.15.8. This issue affects the function shrink_folio_list. Performing manipulation results in denial of service.
This vulnerability was named CVE-2025-39725. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.41/6.15.9/6.16.0. This issue affects the function setup_clusters. Such manipulation leads to buffer overflow.
This vulnerability is referenced as CVE-2025-39727. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.16.0. Impacted is the function __sev_platform_init_locked of the file drivers/crypto/ccp/sev-dev.c of the component crypto. Performing manipulation results in uninitialized pointer.
This vulnerability is identified as CVE-2025-39729. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.15.9/6.16.0. This affects an unknown function of the component team. The manipulation results in privilege escalation.
This vulnerability is cataloged as CVE-2025-39733. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability described as problematic has been identified in HasTech ShopLentor Plugin up to 3.2.0 on WordPress. This impacts an unknown function. Executing manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2025-58990. The attack may be performed from remote. There is no available exploit.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.41/6.15.9/6.16.0. The impacted element is the function ath11k_mac_op_set_bitrate_mask of the file wmi.c. The manipulation leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2025-39732. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.42/6.15.10/6.16.1 and classified as critical. This vulnerability affects the function ath10k_pci of the component wifi. Executing manipulation can lead to denial of service.
This vulnerability is handled as CVE-2025-39746. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.42/6.15.10/6.16.1. Affected is the function msm_ioctl_gem_info_set_metadata of the component drm. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2025-39747. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.16.1/6.17-rc1. Affected is the function put of the component drm. The manipulation results in use after free.
This vulnerability is reported as CVE-2025-39740. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.16.1/6.17-rc1. Affected by this vulnerability is an unknown functionality. This manipulation causes reachable assertion.
This vulnerability appears as CVE-2025-39741. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.102/6.12.42/6.15.10/6.16.1. It has been declared as critical. Impacted is the function arm_smmu_context_fault of the component MDSS Component. The manipulation results in allocation of resources.
This vulnerability was named CVE-2025-39739. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.6.102/6.12.42/6.15.10/6.16.1. This impacts the function rcu_read_unlock. Executing manipulation can lead to state issue.
This vulnerability is tracked as CVE-2025-39744. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 6.15.10/6.16.1 and classified as problematic. Impacted is the function rcutorture_one_extend_check of the file kernel/rcu/rcutorture.c of the component rcu Handler. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2025-39745. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.100/6.12.40/6.15.8. This affects the function ism_cmd. This manipulation causes state issue.
This vulnerability is handled as CVE-2025-39726. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.43/6.16.3. This impacts the function no_page0. Performing manipulation results in state issue.
This vulnerability is reported as CVE-2025-39722. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.16.0. This issue affects the function nvmet_req_init of the file /dev/nvme0n1. Performing manipulation results in state issue.
This vulnerability is known as CVE-2025-38658. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.