PoC Week 2026-04-13

Posted on Apr 13, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-5281

CVE-2025-30208 NEW

CVE-2026-33634

CVE-2026-35616 NEW

CVE-2026-2699 NEW

CVE-2026-34841 NEW

CVE-2026-34156

CVE-2026-31027 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: TOTOlink A3600R v5.9c.4959
  • Description: TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-31027
  • PoC:

CVE-2026-30643 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: DedeCMS 5.7.118
  • Description: An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code via crafted setup tag values in a module upload.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-30643
  • PoC:

CVE-2026-29014 NEW

CVE-2026-28373 NEW

CVE-2026-0740 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Ninja Forms - File Uploads plugin for WordPress 3.3.26, Ninja Forms - File Uploads plugin for WordPress 3.3.25, Ninja Forms - File Uploads plugin for WordPress 3.3.27
  • Description: The Ninja Forms - File Uploads plugin for WordPress is affected by an arbitrary file upload vulnerability that allows unauthenticated attackers to achieve remote code execution. This issue exists in all versions of the plugin up to and including 3.3.26.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-0740
  • PoC:

CVE-2025-54328 NEW

  • Severity: 10.0 CRITICAL
  • Impacted Products: Samsung Mobile Processor, Wearable Processor, Modem Exynos 980, Exynos 990, Exynos 850
  • Description: An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-based Buffer Overflow occurs while parsing SMS RP-DATA messages.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2025-54328
  • PoC:

CVE-2019-25687 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Pegasus CMS 1.0
  • Description: Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2019-25687
  • PoC:

CVE-2018-25254 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: NICO-FTP 3.0.1.19
  • Description: NICO-FTP 3.0.1.19 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. Attackers can connect to the FTP service and send oversized data in response handlers to overwrite SEH pointers and redirect execution to injected shellcode.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2018-25254
  • PoC:

CVE-2016-20052 NEW

  • Severity: 9.8 CRITICAL
  • Impacted Products: Snews CMS 1.7
  • Description: Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by accessing the uploaded file path to achieve remote code execution.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2016-20052
  • PoC:

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.