{"uuid": "85589d2a-bec7-4eb4-9af4-dc50af502645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25527", "type": "seen", "source": "https://t.me/cvedetector/17760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25527 - Ruijie RG-NBR2600S Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25527 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Buffer overflow vulnerability in Ruijie RG-NBR2600S Gateway 10.3(4b12) due to the lack of length verification, which is related to the configuration of source address NAT rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:15.000000Z"}