Hacker continues to scout TeleMessage vulnerabilities, with multiple attack attempts already.

robot
Abstract generation in progress

Odaily News According to a report by GreyNoise, hackers are still trying to exploit the CVE-2025-48927 vulnerability in the TeleMessage application. So far, 11 IP addresses have attempted attacks, and over 2000 IPs have conducted reconnaissance activities. The vulnerability involves the Spring Boot Actuator component, allowing access to the heapdump endpoint and extraction of system data without verification. TeleMessage has stated that the vulnerability has been fixed, but the progress of the fix may vary depending on conditions. (cointelegraph)

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)