{"uuid": "1f551fd5-f74f-4ae3-8737-5253db78ec4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46629", "type": "seen", "source": "https://t.me/cvedetector/24272", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46629 - Tenda RX2 Pro Remote Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-46629 \nPublished : May 1, 2025, 8:15 p.m. | 20\u00a0minutes ago \nDescription : Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated remote attacker to perform unauthorized configuration changes for any router where 'ate' has been enabled by sending a crafted UDP packet \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T23:12:39.000000Z"}