{"uuid": "bdcf0a17-45a2-48f7-87df-02cadbe66a26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4346", "type": "seen", "source": "https://t.me/cvedetector/24598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4346 - D-Link DIR-600L Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4346 \nPublished : May 6, 2025, 10:15 a.m. | 1\u00a0hour, 45\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been classified as critical. Affected is the function formSetWAN_Wizard534. The manipulation of the argument host leads to buffer overflow. It is possible to launch the attack remotely. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T14:29:06.000000Z"}