Erase-install Vulnerabilities

Security vulnerability tracking for Grahampugh Erase-install

Last updated: Mar 4, 2026
Total CVEs

1

Critical

0

With Exploits

1

Last 30 Days

0

Vulnerability Timeline

1 vulnerabilities discovered over time for Erase-install

Severity Distribution

Critical0
0%
High0
0%
Medium1
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-703426.6

An attacker can capture admin credentials entered during system reinstall or erase operations because the software saves this sensitive information in a publicly accessible file. This vulnerability can be exploited by an unauthenticated user who creates a specific type of communication channel on the system.

grahampugherase-install
Exploit Available
about 1 month agoMar 4, 2026

About Grahampugh Erase-install Security

This page provides comprehensive security vulnerability tracking for Grahampugh Erase-install. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Erase-install updated to the latest version
  • • Subscribe to security advisories from Grahampugh
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately