Embedded System Vulnerabilities
A focused list of vulnerabilities relevant to embedded and IoT devices.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2026-25608 | STER uses unencrypted TCP traffic to transmit data over the network. It allows an attacker to conduct a Man-In-The-Midd… | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-25607 | Use of a weak password encoding algorithm in STER software allows the value of the password to be guessed after analyzi… | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-25606 | A SQL injection vulnerability has been identified in STER. Improper neutralization of input provided by user into multi… | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-9011 | The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in a… | High (7.5) | 2026-05-22 | Environment Specific |
| CVE-2026-8692 | The Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder plugin for WordPress is vulnerable t… | Medium (4.3) | 2026-05-22 | Environment Specific |