漏洞描述这是SmarterMain的一个未授权RCE漏洞,出现RCE的位置为ConnectToHub API method,具体的漏洞描述如下图所示:环境搭建这里我直接用的docker搭建的环境,命令如下:然后是.net的反编译工具,我使用的是Rider以及dotPeet,这个就凭个人喜好下载了。漏洞代码分析因为.Net的路由大部分都在MailService.dll,所以可以直接看到这个dll中
A vulnerability has been found in Linux Kernel up to 6.17.2 and classified as critical. This issue affects the function crypto_acomp_streams of the component crypto. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2025-40063. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. The impacted element is the function qm_diff_regs of the component crypto. This manipulation causes improper initialization.
This vulnerability is handled as CVE-2025-40062. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.52/6.17.2 and classified as critical. This affects the function ecap_slads of the component iommu. Executing a manipulation can lead to state issue.
This vulnerability is registered as CVE-2025-40058. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.111/6.12.52/6.17.2. This vulnerability affects the function do_task of the component rxe. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-40061. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2. The affected element is the function etm_setup_aux of the component TRBE Driver. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-40060. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.52/6.17.2. Impacted is the function devm_kzalloc of the component coresight. The manipulation of the argument return leads to unchecked return value.
This vulnerability is traded as CVE-2025-40059. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 and classified as critical. The impacted element is the function user_cluster_connect of the component ocfs2. Performing a manipulation results in double free.
This vulnerability is cataloged as CVE-2025-40055. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. It has been rated as critical. This vulnerability affects the function copy_to_iter of the component vhost. Performing a manipulation of the argument return results in unchecked return value.
This vulnerability is reported as CVE-2025-40056. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.52/6.17.2. This issue affects the function max_vclocks of the component ptp. Executing a manipulation of the argument max can lead to privilege escalation.
This vulnerability appears as CVE-2025-40057. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2. It has been declared as critical. This affects the function netdev_alloc_skb_ip_align of the component net. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-40053. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.17.2. The affected element is the function f2fs_merge_page_bio of the component f2fs. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2025-40054. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.6.111/6.12.52/6.17.2. Impacted is the function cifs_sg_set_buf of the file smb2ops.c of the component Crypto API. This manipulation of the argument sensitive_size causes privilege escalation.
This vulnerability is tracked as CVE-2025-40052. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2. It has been classified as critical. Affected by this issue is the function copy_from_iter of the component vhost. This manipulation causes unchecked return value.
This vulnerability is registered as CVE-2025-40051. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.17.7. The impacted element is the function xe_guc_ct_init of the component guc. This manipulation causes use after free.
The identification of this vulnerability is CVE-2025-68193. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.