Top 3 IoT / OT / Automotive High-Risk Vulnerabilities — 2026-05-05

Here are today's top three highest-risk IoT / OT / Automotive vulnerabilities selected and summarized for you.

Selection note: NVD published today first; then NVD last modified today with publication within roughly the last 30 days.

#1 Tenda Wireless Routers Insufficient Session Validation Vulnerability·‣·

CVE: CVE-2018-25317

CVSS: 9.3

Risk level: CRITICAL

Affected versions: Tenda W3002R, A302, W309R v5.07.64_en

Summary: This vulnerability exists in widely deployed consumer Tenda wireless routers. Unauthenticated attackers can exploit insufficient session validation by sending a crafted admin language cookie with GET requests to the /goform/AdvSetDns endpoint. Successful exploitation allows attackers to modify DNS settings and redirect all user traffic from the affected router to malicious DNS servers.

Remediation: Install the latest available firmware update from Tenda for all affected router models. If no official patch is available, disable remote management of the router and restrict admin interface access to trusted local networks only. Monitor DNS configuration for unapproved changes.

Exploit info: No public exploit found yet.

ʳ·ʳ

#2 GeoVision GV-VMS WebCam Login Unauthenticated Stack Overflow‣·‣

CVE: CVE-2026-7372

CVSS: 9.0

Risk level: CRITICAL

Affected versions: GeoVision GV-VMS V20 20.0.2

Summary: This is a stack-based buffer overflow vulnerability in the web login functionality of GeoVision GV-VMS surveillance software. The vulnerability is caused by an unconstrained sscanf call that does not limit input size when parsing login credentials. Unauthenticated remote attackers can trigger this via a crafted HTTP request, potentially leading to full SYSTEM-level arbitrary code execution.

Remediation: Apply the latest security patch from GeoVision for affected GV-VMS V20 installations. Restrict public access to the GV-VMS web server login endpoint to only trusted IP ranges. Check the official GeoVision advisory for additional workarounds if patching is not immediately possible.

Exploit info: No public exploit found yet.

ᵉ‣ᵉ

#3 GeoVision GV-VMS WebCam Server Login Stack Overflow‣··

CVE: CVE-2026-42370

CVSS: 9.0

Risk level: CRITICAL

Affected versions: GeoVision GV-VMS V20 20.0.2

Summary: A stack overflow vulnerability exists in the WebCam Server login functionality of GeoVision GV-VMS V20. Unauthenticated remote attackers can trigger the vulnerability by sending a specially crafted HTTP request to the affected service. Successful exploitation allows attackers to achieve arbitrary code execution on the affected surveillance system.

Remediation: Upgrade GeoVision GV-VMS V20 to the latest vendor-patched version as soon as possible. Block incoming connections to the WebCam Server from untrusted public networks. Audit system logs for any suspicious activity on affected deployments until remediation is complete.

Exploit info: No public exploit found yet.

This digest is for your personal use only. Please do not share or forward. Unauthorized distribution may result in account termination.