PoC Week 2026-03-02

Posted on Mar 2, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-27574 NEW

CVE-2026-27507 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Binardat 10G08-0800GSM network switch firmware V300SP10260209 and prior
  • Description: Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-27507
  • PoC:

CVE-2026-27211 NEW

CVE-2026-27180 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: MajorDoMo
  • Description: MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-27180
  • PoC:

CVE-2026-27174 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: MajorDoMo
  • Description: MajorDoMo (aka Major Domestic Module) allows unauthenticated remote code execution via the admin panel’s PHP console feature. An include order bug in modules/panel.class.php causes execution to continue past a redirect() call that lacks an exit statement, allowing unauthenticated requests to reach the ajax handler in inc_panel_ajax.php.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-27174
  • PoC:

CVE-2026-26988 NEW

CVE-2026-2686 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: SECCN Dingcheng G10 3.1.0.181203
  • Description: A security vulnerability has been detected in SECCN Dingcheng G10 3.1.0.181203. This impacts the function qq of the file /cgi-bin/session_login.cgi. The manipulation of the argument User leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-2686
  • PoC:

CVE-2026-26198 NEW

CVE-2026-26030 NEW

CVE-2026-25896 NEW

CVE-2026-25242 NEW

CVE-2026-1405 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Slider Future plugin for WordPress, 1.0.5
  • Description: The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘slider_future_handle_image_upload’ function in all versions up to, and including, 1.0.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-1405
  • PoC:

CVE-2025-71243 NEW

CVE-2025-70830

  • Severity: 9.9 CRITICAL
  • Impacted Products: Datart v1.0.0-rc.3
  • Description: A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v1.0.0-rc.3 allows authenticated attackers to execute arbitrary code via injecting crafted Freemarker template syntax into the SQL script field.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-70830
  • PoC:

CVE-2025-65791 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: ZoneMinder v1.36.34
  • Description: ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-65791
  • PoC:

CVE-2025-55853 NEW

  • Severity: 9.1 CRITICAL
  • Impacted Products: SoftVision webPDF before 10.0.2
  • Description: SoftVision webPDF before 10.0.2 is vulnerable to Server-Side Request Forgery (SSRF). The PDF converter function does not check if internal or external resources are requested in the uploaded files and allows for protocols such as http:// and file:///. This allows an attacker to upload an XML or HTML file in the application, which when rendered to a PDF allows for internal port scanning and Local File Inclusion (LFI).
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-55853
  • PoC:

CVE-2025-49113

CVE-2025-15559 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: NesterSoft WorkTime
  • Description: An unauthenticated attacker can inject OS commands when calling a server API endpoint in NesterSoft WorkTime. The server API call to generate and download the WorkTime client from the WorkTime server is vulnerable in the “guid” parameter. This allows an attacker to execute arbitrary commands on the WorkTime server as NT Authority\SYSTEM with the highest privileges. Attackers are able to access or manipulate sensitive data and take over the whole server.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-15559
  • PoC:

CVE-2019-25441 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: thesystem 1.0
  • Description: thesystem 1.0 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the run_command endpoint. Attackers can send POST requests with shell commands in the command parameter to execute arbitrary code on the server without authentication.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2019-25441
  • PoC:

CVE-2019-25361 NEW

  • Severity: 8.8 HIGH
  • Impacted Products: Ayukov NFTP client 1.71
  • Description: Ayukov NFTP client 1.71 contains a buffer overflow vulnerability in the SYST command handling that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted SYST command with oversized payload to trigger a buffer overflow and execute a bind shell on port 5150.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2019-25361
  • PoC:

CVE-2026-20127 NEW

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.