{"uuid": "a5ad5be9-d97e-4aae-9d49-3d3f95e5fea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4349", "type": "seen", "source": "https://t.me/cvedetector/24604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4349 - \"Critical Command Injection in D-Link DIR-600L\"\", \n  \"Content\": \"CVE ID : CVE-2025-4349 \nPublished : May 6, 2025, 12:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in D-Link DIR-600L up to 2.07B01. This affects the function formSysCmd. The manipulation of the argument host leads to command injection. It is possible to initiate the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T16:09:26.000000Z"}