{"uuid": "d1d4049b-e8a9-4ae6-bb68-4a6c0746d2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25522", "type": "seen", "source": "https://t.me/cvedetector/17735", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25522 - Linksys WAP610N Remote Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25522 \nPublished : Feb. 11, 2025, 7:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:24.000000Z"}