{"uuid": "1ce25b35-eac6-4282-8c3d-f58a04301c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1800", "type": "seen", "source": "https://t.me/cvedetector/19241", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1800 - D-Link DAR-7000 HTTP POST Request Handler Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1800 \nPublished : March 1, 2025, 6:15 p.m. | 41\u00a0minutes ago \nDescription : A vulnerability has been found in D-Link DAR-7000 3.2 and classified as critical. This vulnerability affects the function get_ip_addr_details of the file /view/vpn/sxh_vpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument ethname leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T20:02:20.000000Z"}