Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: spotify

Found 3 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-4253
4.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 6 days, 18 hours ago
Tenda AC8 Web UploadCfg route_set_user_policy_rule os command injection

A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of the argument wans.policy.list1 results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

Affected products

AC8
  • ==16.03.50.11

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-4254
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 6 days, 18 hours ago
Tenda AC8 HTTP Endpoint SysToolChangePwd doSystemCmd stack-based overflow

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

Affected products

AC8
  • ==16.03.50.0
  • ==16.03.50.5
  • ==16.03.50.6
  • ==16.03.50.2
  • ==16.03.50.3
  • ==16.03.50.10
  • ==16.03.50.11
  • ==16.03.50.8
  • ==16.03.50.9
  • ==16.03.50.7
  • ==16.03.50.4
  • ==16.03.50.1

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-4252
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 6 days, 18 hours ago
Tenda AC8 IPv6 check_is_ipv6 ip address for authentication

A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

Affected products

AC8
  • ==16.03.50.11

Matching in nixpkgs

Package maintainers