General-Purpose System Vulnerabilities
Vulnerabilities related to traditional IT systems, servers, and desktop applications.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2025-41668 | A low privileged remote attacker with file access can replace a critical file or folder used by the service security-pr… | High (8.8) | 2025-07-08 | General-Purpose |
| CVE-2025-41667 | A low privileged remote attacker with file access can replace a critical file used by the arp-preinit script to get rea… | High (8.8) | 2025-07-08 | General-Purpose |
| CVE-2025-41666 | A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write a… | High (8.8) | 2025-07-08 | General-Purpose |
| CVE-2025-25271 | An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configur… | High (8.8) | 2025-07-08 | General-Purpose |
| CVE-2025-25270 | An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root wit… | Critical (9.8) | 2025-07-08 | General-Purpose |