warrentc3 47 Posted January 19 Posted January 19 When will there be a release to address this vulnerability? My firewall had a few instances of this signature being blocked over the weekend?
warrentc3 47 Posted January 19 Author Posted January 19 (edited) i suppose there’s a way to exploit with a javascript client. CEF:0|Ubiquiti|UniFi Network|10.0.162|200|Threat Detected|9|proto=TCP src=NGINX-DMZ spt=37940 dst=EMBYSERVER dpt=8096 act=allowed app=Other UNIFIcategory=Security UNIFIsubCategory=Intrusion Prevention UNIFIhost=UDM-Pro UNIFIsite=unifi UNIFIrisk=high UNIFIpolicyName=Web Applications UNIFIpolicyType=IDS/IPS UNIFIdirection=incoming deviceInboundInterface=NGINGTUNNEL deviceOutboundInterface=SERVER-SUBNET UNIFIdeviceMac=XX:XX:XX:XX:XX:XX UNIFIdeviceName=UDM-Pro UNIFIdeviceModel=UDM-Pro UNIFIdeviceIp=192.168.1.1 UNIFIdeviceVersion=4.4.6 UNIFIsrcZone=Vpn UNIFIdstZone=Internal UNIFIdstDomain=XXXXXXXX UNIFItotalBytes=12221 UNIFItotalPackets=25 UNIFIpacketsReceived=12 UNIFIpacketsSent=13 UNIFIbytesReceived=1033 UNIFIbytesSent=11188 UNIFIflowCount=1 UNIFIflowId=null UNIFIflowStartTime=Jan 19, 2026 at 2:02:30.159 AM UNIFIipsSessionId=635637292494358 UNIFIipsSignature=ET WEB_SPECIFIC_APPS React Server Components React2Shell Unsafe Flight Protocol Property Access (CVE-2025-55182) UNIFIipsSignatureId=2066027 UNIFIutcTime=2026-01-19T07:02:31.694Z msg=A network intrusion attempt from NGINX-DMZ to EMBYSERVER has been detected. Edited January 19 by warrentc3 codeblock log
TMCsw 246 Posted January 20 Posted January 20 3 hours ago, warrentc3 said: i suppose there’s a way to exploit with a javascript client. WOW, hacker go away.......... 1
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now