{"uuid": "a6e34f35-e15b-4824-b745-cf99c7748b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25523", "type": "seen", "source": "https://t.me/cvedetector/17733", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25523 - Trendnet TEG-40128 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25523 \nPublished : Feb. 11, 2025, 7:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:22.000000Z"}