Google Android security bulletin for January 2026 patches Zero-Click vulnerability in Dolby Audio decoder

Google's January 2026 Android Security Bulletin fixes a critical remote code execution vulnerability in the Dolby DD+ codec. This flaw allows attackers to take control of devices through malicious audio processing.

**An update with only one flaw in Android, but it's still very important - the flaw is amplified by Android defaults. Most users can't rush the patch because their vendors may not have released an updated version of Android for their devices. Be aware that you shouldn't delay the update to your Android when the notification arrives on your phone.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-android-security-bulletin-for-january-2026-patches-zero-click-vulnerability-in-dolby-audio-decoder-i-0-7-4-h/gD2P6Ple2L

Google Android security bulletin for January 2026 patches Zero-Click vulnerability in Dolby Audio decoder

Google's January 2026 Android Security Bulletin fixes a critical remote code execution vulnerability in the Dolby DD+ codec. This flaw allows attackers to take control of devices through malicious audio processing.

BeyondMachines

Unpatched root backdoor found in EoL TOTOLINK EX200 extenders

CERT/CC warned of an unpatched vulnerability (CVE-2025-65606) in the end-of-life TOTOLINK EX200 range extender that allows authenticated attackers to open a root-level telnet backdoor. Because the device is no longer supported, no official fix is available.

**If you are using TOTOLINK EX200, be aware that it can be exploited trivially by anyone with minimal access. Ideally, replace it with another device. If that's not possible, limit the number of authenticated users on the web management, with strong passwords and never expose the management interface to the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/unpatched-root-backdoor-found-in-eol-totolink-ex200-extenders-7-e-d-z-s/gD2P6Ple2L

Unpatched root backdoor found in EoL TOTOLINK EX200 extenders

CERT/CC warned of an unpatched vulnerability (CVE-2025-65606) in the end-of-life TOTOLINK EX200 range extender that allows authenticated attackers to open a root-level telnet backdoor. Because the device is no longer supported, no official fix is available.

BeyondMachines

Critical path traversal flaw reported in jsPDF library

jsPDF version 4.0.0 patches a critical path traversal vulnerability (CVE-2025-68428) that allows attackers to extract sensitive server files by embedding them into generated PDFs. The flaw affects Node.js environments where user-supplied paths are passed to methods like loadFile or addImage.

**If you are using jsPDF, review this advisory and your use case. Ideally, update to version 4.0.0 and use the Node.js --permission flag to limit which files the process can read. Also, as a normal best practice, always sanitize and validate user input before passing it to libraries.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-flaw-reported-in-jspdf-library-a-5-v-c-c/gD2P6Ple2L

Critical path traversal flaw reported in jsPDF library

jsPDF version 4.0.0 patches a critical path traversal vulnerability (CVE-2025-68428) that allows attackers to extract sensitive server files by embedding them into generated PDFs. The flaw affects Node.js environments where user-supplied paths are passed to methods like loadFile or addImage.

BeyondMachines

Ubiquiti patches security flaws in UniFi Protect camera software

Ubiquiti patched two vulnerabilities in the UniFi Protect Application, including CVE-2026-21633 which allows attackers on the local network to access camera feeds without authorization.

**If you are using UniFi Protect Application, plan a quick update. And as usual, make sure all cameras and camera controllers are isolated from the internet and accessible from trusted networks only. Use VLANs to separate your security cameras from guest or general-purpose networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/ubiquiti-patches-security-flaws-in-unifi-protect-camera-software-s-f-f-b-f/gD2P6Ple2L

Ubiquiti patches security flaws in UniFi Protect camera software

Ubiquiti patched two vulnerabilities in the UniFi Protect Application, including CVE-2026-21633 which allows attackers on the local network to access camera feeds without authorization.

BeyondMachines

Critical path traversal flaw in AdonisJS enable server takeover

AdonisJS patched a critical path traversal vulnerabilities (CVE-2026-21440) that allow attackers to write or read arbitrary files on servers.

**Update your AdonisJS dependencies immediately to prevent attackers from overwriting your application code or stealing local files. Always sanitize user-provided filenames and use the Node.js permission flag to limit file system access.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-flaw-in-adonisjs-enable-server-takeover-l-o-y-a-8/gD2P6Ple2L

Critical path traversal flaw in AdonisJS enable server takeover

AdonisJS patched a critical path traversal vulnerabilities (CVE-2026-21440) that allow attackers to write or read arbitrary files on servers.

BeyondMachines

Critical sandbox bypass reported in n8n automation platform

n8n patched a critical sandbox bypass vulnerability (CVE-2025-68668) that allows authenticated users to run arbitrary system commands on the host server.

**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 2.0.0 ASAP. Until you can patch, either disable the Python or the entire Code Node.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sandbox-bypass-reported-in-n8n-automation-platform-v-9-8-b-2/gD2P6Ple2L

Critical sandbox bypass reported in n8n automation platform

n8n patched a critical sandbox bypass vulnerability (CVE-2025-68668) that allows authenticated users to run arbitrary system commands on the host server.

BeyondMachines
Boil-water advisories lifted near Calgary watermain break after pipe burst
Anyone who has not turned on the taps in the last 24 hours should flush their home's water systems before using.
#water #advisory #pipe #Calgary #Canada #BoilWaterAdvisory
https://globalnews.ca/news/11599392/boil-water-advisory-lifted-calgary/
Boil-water advisories lifted near Calgary watermain break after pipe burst
Anyone who has not turned on the taps in the last 24 hours should flush their home's water systems before using.
#water #advisory #pipe #Calgary #Canada #BoilWaterAdvisory
https://globalnews.ca/news/11599392/boil-water-advisory-lifted-calgary/
Boil-water advisories lifted near Calgary watermain break after pipe burst
Anyone who has not turned on the taps in the last 24 hours should flush their home's water systems before using.
#water #advisory #pipe #Calgary #Canada #BoilWaterAdvisory
https://globalnews.ca/news/11599392/boil-water-advisory-lifted-calgary/
Boil-water advisories lifted near Calgary watermain break after pipe burst
Anyone who has not turned on the taps in the last 24 hours should flush their home's water systems before using.
#water #advisory #pipe #Calgary #Canada #BoilWaterAdvisory
https://globalnews.ca/news/11599392/boil-water-advisory-lifted-calgary/