{"uuid": "f93ca473-e107-4999-87d2-e1fc5d08ec0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4348", "type": "seen", "source": "https://t.me/cvedetector/24591", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4348 - D-Link DIR-600L L2TP Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-4348 \nPublished : May 6, 2025, 11:15 a.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-600L up to 2.07B01. It has been rated as critical. Affected by this issue is the function formSetWanL2TP. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T14:28:55.000000Z"}