{"uuid": "453be29d-0192-4eb6-896e-54aa119dc08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2550", "type": "seen", "source": "https://t.me/cvedetector/20752", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2550 - D-Link DDNS Service Local Network Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2550 \nPublished : March 20, 2025, 5:15 p.m. | 55\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/formSetDDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T19:54:35.000000Z"}