{"uuid": "67c7cc4b-9c38-4611-8fca-2c9ae12c35a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3548", "type": "seen", "source": "https://t.me/cvedetector/22821", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3548 - \"Assimp Heap-Based Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-3548 \nPublished : April 14, 2025, 3:15 a.m. | 58\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp up to 5.4.3. This issue affects the function aiString::Set in the library include/assimp/types.h of the component File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T06:17:58.000000Z"}