Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Gemini 2.5 Pro and Flash are generally available and Gemini 2.5 Flash-Lite preview is announced

      June 19, 2025

      CSS Cascade Layers Vs. BEM Vs. Utility Classes: Specificity Control

      June 19, 2025

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      Meet Accessible UX Research, A Brand-New Smashing Book

      June 18, 2025

      How to free up your Mac’s storage space – 3 easy ways

      June 19, 2025

      I finally found a mini PC with a striking design (and the power to back it up)

      June 19, 2025

      The best password generators of 2025: Expert tested

      June 19, 2025

      Facebook’s new passkey support could soon let you ditch your password forever

      June 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      eslint-plugin-mutate

      June 19, 2025
      Recent

      eslint-plugin-mutate

      June 19, 2025

      Event-Driven Microservice Backend For a Modern E-commerce Platform.

      June 19, 2025

      Search Params Are State – How TanStack Router Solves It

      June 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You Can Now Auto-Generate Google Forms Using Gemini Using Prompts or Files – Here’s How

      June 19, 2025
      Recent

      You Can Now Auto-Generate Google Forms Using Gemini Using Prompts or Files – Here’s How

      June 19, 2025

      Google Helps Devs Build Safe Android Apps with THIS Play Policy – Find Out More Here

      June 19, 2025

      Microsoft Edge for Business Now Lets Admins Push Encrypted Passwords to Users Securely

      June 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-23173 – Versa Networks Versa Director Websockify Remote Code Execution Vulnerability

    CVE-2025-23173 – Versa Networks Versa Director Websockify Remote Code Execution Vulnerability

    June 18, 2025

    CVE ID : CVE-2025-23173

    Published : June 19, 2025, 12:15 a.m. | 1 hour, 47 minutes ago

    Description : The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution.

    Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.

    Workarounds or Mitigation:

    Restrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-24286 – Citrix NetScaler Authenticated RCE Vulnerability
    Next Article CVE-2025-23172 – “Versa Networks Director Webhook Command Execution”

    Related Posts

    Security

    Massive Data Leak: Hacker Allegedly Selling 16 Billion Login Credentials from Major Tech Giants

    June 20, 2025
    Security

    Microsoft 365 Boosts Security: Legacy File Access Protocols RPS & FrontPage RPC Phased Out July 2025

    June 20, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Skywings Marketing: Best Digital Marketing Agencies in Ghaziabad

    Web Development

    A customizable and accessible web component

    Development

    CVE-2025-4307 – PHPGurukul Art Gallery Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    10 personal safety features every Pixel user should know about – and use

    News & Updates

    Highlights

    CVE-2025-41385 – “Wivia OS Command Injection Vulnerability”

    May 30, 2025

    CVE ID : CVE-2025-41385

    Published : May 30, 2025, 7:15 a.m. | 2 hours, 21 minutes ago

    Description : An OS Command Injection issue exists in wivia 5 all versions. If this vulnerability is exploited, an arbitrary OS command may be executed by a logged-in administrative user.

    Severity: 6.7 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    DevSecOps Phase 4B: Manual Penetration Testing

    June 1, 2025

    CVE-2025-48415 – Cisco USB Backdoor Command Injection Vulnerability

    May 21, 2025

    CVE-2025-4135 – Netgear WG302v2 Command Injection Vulnerability

    April 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.