A vulnerability was found in danielmiessler Personal_AI_Infrastructure up to 2.3.0 and classified as critical. Affected is an unknown function of the file Skills/Parser/Tools/parse_url.ts. Executing a manipulation can lead to os command injection.
The identification of this vulnerability is CVE-2026-6141. The attack may be launched remotely. Furthermore, there is an exploit available.
It is advisable to implement a patch to correct this issue.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024 and classified as critical. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection.
This vulnerability was named CVE-2026-6140. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection.
This vulnerability is uniquely identified as CVE-2026-6139. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability, which was classified as critical, has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection.
This vulnerability is handled as CVE-2026-6138. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability classified as critical was found in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow.
This vulnerability is known as CVE-2026-6137. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability classified as critical has been found in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2026-6136. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability described as critical has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2026-6135. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability marked as critical has been reported in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow.
This vulnerability is reported as CVE-2026-6134. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability labeled as critical has been found in Tenda F451 1.0.0.7_cn_svn7958. This affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Such manipulation of the argument page leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2026-6133. The attack can be executed remotely. Additionally, an exploit exists.