🚨 A CRITICAL vulnerability (CVE-2026-6057) in FalkorDB Browser 1.9.3 exposes systems to unauthenticated path traversal via the file upload API. Successful exploitation could allow remote attackers to write arbitrary files, risking full system compromise through potential remote code execution. No official patch is available yet. Actionable tips: Restrict access to the file upload API, do not expose vulnerable installations to untrusted networks, and monitor for unusual file upload activity. Stay alert for vendor updates. https://lnkd.in/dV4krRrb #OffSeq #FalkorDB #CyberSecurity #Vulnerability #PathTraversal
OffSeq
Computer and Network Security
Latgale neighborhood, Riga 586 followers
Adversary Tactics for Cyber Resilience
About us
OffSeq is a cutting-edge European cybersecurity company helping organizations build digital resilience through tailored, proactive security solutions. Headquartered in the Baltics and active across the EU, we empower businesses to defend against evolving threats while staying compliant with NIS2, GDPR, ISO 27001, and national cybersecurity laws. 🛡️ Our Mission To secure digital environments through real-time intelligence, ethical hacking, governance frameworks, and human-centric defense strategies. 🔍 Core Services • CISO-as-a-Service – Fractional cybersecurity leadership for compliance and risk management • Proactive Security Monitoring – 24/7 protection from emerging threats • Red Team & Security Audits – Adversary simulations and technical reviews • OSINT Reconnaissance – Discover your exposure before attackers do • Social Engineering Tests – Evaluate your team’s response to manipulation • Employee Training – Build a security-aware workforce • DPIAs & Compliance Audits – Meet GDPR, NIS2, and NKDL obligations • Policy & Tech Advisory – Governance, security policies, and tech stack selection • Incident Response Planning – Be ready when breaches occur 🌐 Threat Radar Platform Our Threat Radar (radar.offseq.com) delivers real-time threat intelligence, severity scoring, CVE monitoring, attack mapping, and dark web insights across Europe and beyond. 🎯 Why OffSeq? • Peace-of-mind security operations • Recognized expertise trusted by SMEs and global brands like LG • Scalable and affordable coverage across the EU • Black-box audits to uncover hidden threats—no access needed 🔗 Visit offseq.com or radar.offseq.com to get started. Let’s build a safer, smarter digital future—together. #CyberSecurity #NIS2 #CISOasAService #RedTeam #OSINT #ThreatIntelligence #DigitalResilience #Europe #CyberCompliance #OffSeq
- Website
-
https://offseq.com
External link for OffSeq
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Latgale neighborhood, Riga
- Type
- Privately Held
- Founded
- 2015
- Specialties
- Privacy, Data Protection, Investigations, Penetration Testing, Information Security, Ethical Hacking, OSINT, Cybersecurity, OWASP, Red team, and Security
Locations
-
Primary
Get directions
Lastādijas iela 12
k-3
Latgale neighborhood, Riga LV-1050, LV
Employees at OffSeq
Updates
-
🔴 CRITICAL vulnerability alert: CVE-2026-1115 in parisneo/lollms (versions before 2.2.0) exposes users to stored XSS via unsanitized input in the social feature’s create_post function. Attackers can inject malicious JavaScript, leading to account takeover, session hijacking, and even wormable attacks — impacting confidentiality, integrity, and availability. Immediate action: Upgrade to version 2.2.0 or later to fully mitigate this issue. No other workaround is provided. Stay protected! https://lnkd.in/d_piKSas #OffSeq #XSS #AppSec #Vulnerability #InfoSec
-
-
🚩 A new CRITICAL vulnerability (CVE-2026-6029, CVSS 9.3) in Totolink A7100RU (firmware 7.4cu.2313_b20191024) allows remote, unauthenticated attackers to execute OS commands via the setVpnAccountCfg function. Exploit code is public, and no official patch is available. Impact: Potential full device compromise — confidentiality, integrity, and availability at risk. Action: Immediately restrict device management to trusted networks, disable vulnerable services if possible, and monitor for vendor updates. Apply patches promptly once available. https://lnkd.in/dyA8hKd3 #OffSeq #Vulnerability #RouterSecurity #CVE20266029 #NetworkSecurity
-
-
A CRITICAL OS command injection vulnerability (CVSS 9.3) has been identified in Totolink A7100RU (v7.4cu.2313_b20191024). Unauthenticated remote attackers can execute arbitrary OS commands via the setTelnetCfg function, risking full device compromise. 🚨 Public exploit code is available, increasing the risk of attacks. No official patch yet — urgently review vendor advisories. Mitigation: Disable remote management, limit device exposure, monitor for unusual activity, and restrict network access where possible. Stay alert for vendor updates. More info: https://lnkd.in/dW_grcix #OffSeq #Cybersecurity #Vulnerability #RouterSecurity #InfoSec
-
-
A critical OS command injection vulnerability (CVE-2026-5996, CVSS 9.3) affects Totolink A7100RU routers running firmware 7.4cu.2313_b20191024. Attackers can execute arbitrary OS commands on the device with no authentication required, potentially leading to full compromise and lateral movement within your network. 🚨 No vendor patch is available yet. To reduce risk, restrict remote management access, avoid exposing the CGI interface, and monitor for suspicious activity. Stay tuned to vendor advisories for updates and apply fixes as soon as they're released. https://lnkd.in/d2duGFHJ #OffSeq #Vulnerability #RouterSecurity #Infosec #CriticalRisk
-
-
🚨 CVE-2026-5997: A critical OS command injection flaw affects Totolink A7100RU routers (firmware 7.4cu.2313_b20191024). Remote attackers can exploit the 'admpass' parameter to execute arbitrary OS commands — no authentication needed. With a CVSS 9.3 score, this vulnerability could lead to full device compromise, data theft, or service disruption. No official patch yet. Recommended: disable remote management, restrict access to trusted networks, and monitor vendor updates. Stay vigilant! https://lnkd.in/dDPU2Wtb #OffSeq #ThreatIntel #RouterSecurity #Vulnerability #InfoSec
-
-
🚨 CRITICAL alert for Totolink A7100RU (firmware 7.4cu.2313_b20191024): CVE-2026-5995 allows unauthenticated OS command injection via CGI Handler, posing a significant risk of remote takeover. Public exploits exist, but no active exploitation confirmed. No official patch yet — review the vendor advisory, disable remote management, restrict network access to the management interface, and monitor for suspicious activity. Stay alert for Totolink updates. https://lnkd.in/dQ2jcp_4 #OffSeq #Cybersecurity #Vulnerability #RouterSecurity #PatchManagement
-
-
🚨 CVE-2026-34424 (CRITICAL): Smart Slider 3 Pro 3.5.1.35 for WordPress & Joomla contains embedded malicious code from a compromised update system. Attackers can gain unauthenticated remote code execution, install stealth backdoors, create hidden admin accounts, and exfiltrate credentials — with no patch available. Immediate action: remove/disable the plugin, monitor for suspicious admin accounts or file changes, and verify update integrity. Stay vigilant and follow vendor advisories. https://lnkd.in/dWHG7rg4 #OffSeq #WordPress #Joomla #ThreatIntel #Cybersecurity
-
-
A CRITICAL vulnerability (CVSS 9.1) in Canonical LXD (v4.12 – 6.7) allows remote authenticated users with restricted TLS certificate privileges to escalate to cluster admin via improper Type field validation. No official patch is available yet. 🔒 Until remediation, restrict certificate update API access to trusted users and closely monitor for suspicious activity. Full cluster control at stake — act now to reduce risk. https://lnkd.in/duRXs_gD #OffSeq #LXD #Vulnerability #PrivilegeEscalation #Infosec
-
-
A critical OS command injection vulnerability (CVSS 9.3) impacts Totolink A7100RU routers (fw 7.4cu.2313_b20191024). Attackers can execute arbitrary OS commands remotely and unauthenticated, leading to full device compromise. No official patch is available yet. 🔒 Recommended actions: Restrict management access from untrusted networks and disable vulnerable services if possible. Closely monitor vendor advisories and apply updates as soon as they're available. More info: https://lnkd.in/daytAD69 #OffSeq #CVE20265850 #Cybersecurity #RouterSecurity #Vulnerability
-