Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42.
The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability affecting
A vulnerability was found in Linux Kernel up to 6.6.93/6.12.33/6.15.2 and classified as critical. This vulnerability affects the function phy_detach. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-38149. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.2. It has been rated as problematic. The affected element is an unknown function of the file kernel/locking/mutex.c of the component af_packet. Performing a manipulation results in improper locking.
This vulnerability is reported as CVE-2025-38150. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.15.2. It has been classified as critical. Affected by this issue is the function txopt_get of the component calipso. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-38147. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability has been found in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2 and classified as critical. This affects an unknown part of the component net. The manipulation leads to memory leak.
This vulnerability is listed as CVE-2025-38148. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.15.2. Affected by this vulnerability is the function aspeed_lpc_enable_snoop of the component soc. Performing a manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2025-38145. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.15.2. Affected by this issue is the function __be32 of the component openvswitch. Executing a manipulation can lead to improper validation of array index.
This vulnerability is tracked as CVE-2025-38146. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.15.2. The impacted element is the function devm_ioremap of the component watchdog. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-38144. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.15.2. This impacts the function wled_configure of the component backlight. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2025-38143. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2. Affected is the function read_string of the component hwmon. Such manipulation leads to memory corruption.
This vulnerability is referenced as CVE-2025-38142. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.15.2. This affects the function dm_revalidate_zones. This manipulation of the argument nr_zones causes allocation of resources.
This vulnerability is tracked as CVE-2025-38140. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.33/6.15.2. This impacts the function dm_get_live_table. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2025-38141. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.15.2. The impacted element is the function netfs_retry_write_stream in the library lib/iov_iter.c. The manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-38139. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Linux Kernel up to 6.15.2. This affects the function udma_probe of the component dmaengine. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2025-38138. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in util-linux up to 2.41.3. The impacted element is the function fork of the file /usr/bin/mount. This manipulation causes link following.
The identification of this vulnerability is CVE-2026-27456. The attack can only be executed locally. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in flatpak -builder up to 1.4.7. It has been declared as critical. This vulnerability affects the function g_file_resolve_relative_path. Executing a manipulation can lead to path traversal.
This vulnerability is handled as CVE-2026-39977. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.