Fortinet FortiWeb OS Command Injection PoC The patch will be released at the end of August https://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection/
NETGEAR is aware of a security issue on some models of ProSAFE Gigabit Smart Managed Switches that can let an attacker permanently modify certain system variables. This vulnerability occurs when a remote attacker uses SNMP to access stored XSS on the web management interface. The only system variables that can be accessed and modified because of this vulnerability are system name, system location, and system contact. No other settings are vulnerable, and no network traffic or credentials are exposed. This vulnerability affects the following products: GS724Tv3 and GS716Tv2 with firmware version 5.4.2.25 or earlier GS510TP with firmware version 5.4.2.25 or earlier GS108Tv2 and GS110TP with
Stored XSS in Netgear ProSAFE GS724Tv3 and GS716Tv2 with firmware version 5.4.2.25 or earlier GS510TP with firmware version 5.4.2.25 or earlier GS108Tv2 and GS110TP with firmware version 5.4.2.25 or earlier GS748Tv4 with firmware version 5.4.2.25 or earlier. POC can be found here: (https://cyberant.com/en/knowledge-base-item/cve-2016-7941-xss-in-netgear-prosafe-switches/)
QNAP NAS HBS 3 Hybrid Backup Syn Hard-Coded Credentials QLocker Ransomware is using this vulnerability to encrypt files of QNAP customers. https://forum.qnap.com/viewtopic.php?t=160876&p=787015
Write-up of CVE-2021-30481 Source engine remote code execution via game invites https://secret.club/2021/04/20/source-engine-rce-invite.html
Pulse Connect Secure remote code execution through authentication bypass. CVSS V3.1 risk score is 10/10. The vulnerability has been exploited in the wild by the threat actor UNC2630. According to Fireeye UNC2630 may have ties with APT5 and the Chinese government. https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html
Airstrike Attack - FDE bypass and EoP on domain joined Windows workstations (CVE-2021-28316) https://shenaniganslabs.io/2021/04/13/Airstrike.html
Remote exploitation of a man-in-the-disk vulnerability in WhatsApp (CVE-2021-24027) https://census-labs.com/news/2021/04/14/whatsapp-mitd-remote-exploitation-CVE-2021-24027/