PoC Week 2026-02-16

Posted on Feb 16, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.

CVE-2026-24061

CVE-2026-21533 NEW

CVE-2026-21510 NEW

CVE-2026-21531 NEW

CVE-2026-25643 NEW

CVE-2026-25641 NEW

CVE-2026-25526 NEW

CVE-2026-25505 NEW

CVE-2026-21509

CVE-2026-2017 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: IP-COM W30AP up to 1.0.0.11(1340)
  • Description: A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the function R7WebsSecurityHandler of the file /goform/wx3auth of the component POST Request Handler. The manipulation of the argument data results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-2017
  • PoC:

CVE-2026-1862 NEW

CVE-2026-1731 NEW

  • Severity: Unknown
  • Impacted Products: BeyondTrust Remote Support (RS) 25.3.1 and prior, Privileged Remote Access (PRA) 24.3.4 and prior
  • Description: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) are affected by an OS command injection vulnerability that allows for unauthenticated remote code execution. An attacker can exploit this flaw by sending specially crafted requests to the application to execute arbitrary operating system commands.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1731
  • PoC:

CVE-2025-68723 NEW

  • Severity: 9.0 CRITICAL
  • Impacted Products: Axigen Mail Server before 10.5.57
  • Description: Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabilities in the WebAdmin interface. Three instances exist: (1) the log file name parameter in the Local Services Log page, (2) certificate file content in the SSL Certificates View Usage feature, and (3) the Certificate File name parameter in the WebMail Listeners SSL settings. Attackers can inject malicious JavaScript payloads that execute in administrators' browsers when they access affected pages o…
  • Remediation:
  • More Info: NVD - CVE-2025-68723
  • PoC:

CVE-2025-24799 NEW

CVE-2025-10878

  • Severity: 10.0 CRITICAL
  • Impacted Products: Fikir Odalari AdminPando 1.0.1
  • Description: A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website content (HTML/DOM manipulation).
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-10878
  • PoC:

CVE-2020-37125 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Edimax EW-7438RPn-v3 Mini 1.27
  • Description: Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2020-37125
  • PoC:

CVE-2020-37080 NEW

  • Severity: 8.1 HIGH
  • Impacted Products: webTareas 2.0.p8
  • Description: webTareas 2.0.p8 contains a file deletion vulnerability in the print_layout.php administration component that allows authenticated attackers to delete arbitrary files. Attackers can exploit the vulnerability by manipulating the ‘atttmp1’ parameter to specify and delete files on the server through an unauthenticated file deletion mechanism.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2020-37080
  • PoC:

CVE-2020-37065 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: StreamRipper32 version 2.6
  • Description: StreamRipper32 version 2.6 contains a buffer overflow vulnerability in the Station/Song Section that allows attackers to overwrite memory by manipulating the SongPattern input. Attackers can craft a malicious payload exceeding 256 bytes to potentially execute arbitrary code and compromise the application.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2020-37065
  • PoC:

CVE-2025-61882

CVE-2025-55182

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.