PoC Week 2026-05-11

Posted on May 11, 2026

The most featured CVEs in this week’s security newsletters, with public Proof-of-Concepts, ordered by mention count.

For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. I don’t vouch for any links in this list: follow them with caution.

CVE-2026-41940

CVE-2026-31431

CVE-2024-1708 NEW

CVE-2026-7482 NEW

  • Severity: 9.1 CRITICAL
  • Impacted Products: Ollama 0.17.1
  • Description: Ollama versions prior to 0.17.1 are affected by a heap out-of-bounds read vulnerability in the GGUF model loader that allows unauthenticated remote attackers to access sensitive server memory. This issue occurs when the application processes a maliciously crafted GGUF file via the /api/create endpoint.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-7482
  • PoC:

CVE-2026-7411 NEW

CVE-2026-42796 NEW

CVE-2026-42778 NEW

CVE-2026-3854

CVE-2026-36356 NEW

  • Severity: 9.1 CRITICAL
  • Impacted Products: MeiG Smart FORGE_SLT711 (firmware MDM9607.LE.1.0-00110-STD.PROD-1)
  • Description: The GoAhead web server on MeiG Smart FORGE_SLT711 devices (firmware MDM9607.LE.1.0-00110-STD.PROD-1) allows unauthenticated OS command injection via the /action/SetRemoteAccessCfg endpoint.
  • Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
  • More Info: NVD - CVE-2026-36356
  • PoC:

CVE-2026-24118 NEW

CVE-2026-0300 NEW

CVE-2026-23918 NEW

References

This list was scraped from the quite amazing and highly recommended newsletters below:

Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.