article thumbnail

Aquabot variant v3 targets Mitel SIP phones

Security Affairs

In mid-July 2024, Mitel addressed the vulnerability with the release of firmware updates. “In his GitHub README, Burns reported that he found that the Mitel 6869i SIP phone, firmware version 6.3.0.1020, failed to sanitize user-supplied input properly, and he found multiple endpoints vulnerable to this. HF1 (R6.4.0.136).

article thumbnail

Critical Blink Router Flaws (CVSS 9.8) Allow Remote Root Code Execution via Unauthenticated Attacks

Penetration Testing

The flaws, tracked as CVE-2025-45984 through CVE-2025-45988, affect a wide range of firmware versions used in both consumer and enterprise-grade networking equipment. Shared Affected Codebase: Each flaw targets the same goahead binary and associated shared object, amplifying the impact across models and firmware versions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WAGO Device Manager Vulnerabilities Expose Critical Industrial Infrastructure to Remote Exploits

Penetration Testing

The WAGO Device Manager is a configuration tool embedded in the firmware of WAGO’s industrial control systems (ICS). The flaws, coordinated by CERT@VDE, are tracked as CVE-2025-25264 and CVE-2025-25265, and have been assigned CVSS scores of 8.8 respectively. Support independent cybersecurity journalism.

article thumbnail

Hard drives containing sensitive medical data found in flea market

Malwarebytes

Some modern drives come with a secure erase command embedded in the firmware, but you need special software to execute the command, and it may require several rounds of overwrite. Using a data removal service increases online anonymity, which makes it harder for stalkers, phishers, other attackers, or advertisers to find personal details.

article thumbnail

Triada strikes back

SecureList

With time, the vulnerabilities were patched, and restrictions were added to the firmware. Attackers are leveraging this by embedding malicious software into Android device firmware. Attackers are now embedding a sophisticated multi-stage loader directly into device firmware. oat ) located in the same directory.

article thumbnail

Weaponizing Group Policy: Custom Client-Side Extensions as a Stealthy Backdoor into Active Directory

Penetration Testing

Related Posts: ME Analyzer: Intel Engine Firmware Analysis Tool CSE CybSec ZLAB releases Malware Analysis Report: Dark Caracal APT 10,000 WordPress Websites Compromised to Deliver macOS and Windows Malware Rate this post Found this helpful? Bypasses common detection tools, especially if custom GUIDs and stealthy deployment are used. “

article thumbnail

CVE-2025-5491: Acer Control Center Bug Allows Remote Code Execution as NT AUTHORITYSYSTEM

Penetration Testing

Related Posts: 160GB of confidential data leaked, PC giant Acer confirms its servers were hacked High vulnerability affects Acer UEFI firmware Android system is also affected by Linux kernel Dirty Pipe flaw, Google is fixing it Rate this post Found this helpful? You can find the latest version on our Drivers and Manuals site.