{"vulnerability": "CVE-2025-2903", "sightings": [{"uuid": "c68bcc67-8505-4ac3-a610-02c88efe1f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29030", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7569", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29030\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function.\n\ud83d\udccf Published: 2025-03-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T13:44:49.081Z\n\ud83d\udd17 References:\n1. https://github.com/WhereisDoujo/CVE/issues/3", "creation_timestamp": "2025-03-14T14:45:30.000000Z"}, {"uuid": "c51d4717-be3f-4e87-b31a-d645adceecde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29031", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7568", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29031\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function.\n\ud83d\udccf Published: 2025-03-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T13:44:50.818Z\n\ud83d\udd17 References:\n1. https://github.com/WhereisDoujo/CVE/issues/5", "creation_timestamp": "2025-03-14T14:45:30.000000Z"}, {"uuid": "a124f259-9ace-490d-a5d7-9a9ddf46615c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29032", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7567", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29032\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function.\n\ud83d\udccf Published: 2025-03-14T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T13:44:51.953Z\n\ud83d\udd17 References:\n1. https://github.com/WhereisDoujo/CVE/issues/6", "creation_timestamp": "2025-03-14T14:45:26.000000Z"}, {"uuid": "90c08aed-762c-4d90-ab58-6f7eac571d50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29036", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10003", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29036\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in hackathon-starter v.8.1.0 allows a remote attacker to escalate privileges via the user.js component.\n\ud83d\udccf Published: 2025-04-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-01T20:15:52.237Z\n\ud83d\udd17 References:\n1. https://github.com/sahat/hackathon-starter/issues/1326\n2. https://github.com/sahat/hackathon-starter/pull/1328\n3. https://github.com/HypeDuke/vulnerable-research/blob/main/CVE-2025-29036", "creation_timestamp": "2025-04-01T20:33:22.000000Z"}, {"uuid": "69c898e3-a7a5-4b81-a800-e728fcc60fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29033", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10549", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29033\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in BambooHR Build v.25.0210.170831-83b08dd allows a remote attacker to escalate privileges via the /saml/index.php?r=\" HTTP GET parameter.\n\ud83d\udccf Published: 2025-04-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-04T20:24:02.666Z\n\ud83d\udd17 References:\n1. https://github.com/nikolas-ch/CVEs/tree/main/Bamboohr_25.0210.170831-83b08dd/OpenRedirect", "creation_timestamp": "2025-04-04T20:36:23.000000Z"}, {"uuid": "39412f70-600a-4202-b3e1-54ed0c3fa633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2903", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12193", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2903\n\ud83d\udd25 CVSS Score: 8.5 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM.\n\ud83d\udccf Published: 2025-04-17T06:50:11.131Z\n\ud83d\udccf Modified: 2025-04-17T06:50:11.131Z\n\ud83d\udd17 References:\n1. https://portal.perforce.com/s/detail/a91PA000001Sed3YAC", "creation_timestamp": "2025-04-17T06:57:13.000000Z"}, {"uuid": "07cf0472-a5f6-4ca6-b467-9aa19bb6591b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29039", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12270", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29039\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8\n\ud83d\udccf Published: 2025-04-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T16:52:57.332Z\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/xyqer1/Dlink-dir-823x-set_ntp-year-CommandInjection\n3. https://gist.github.com/xyqer1/734fd1d93e4c08cea55dcb1e8b189a2b", "creation_timestamp": "2025-04-17T16:58:28.000000Z"}, {"uuid": "8bd6162f-398f-4498-9f38-105278eba246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29039", "type": "seen", "source": "https://t.me/cvedetector/23249", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29039 - Dlink DIR 832x Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29039 \nPublished : April 17, 2025, 5:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T20:30:21.000000Z"}, {"uuid": "2eeb7f5a-f482-4cb7-944e-cf835485bdeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2903", "type": "seen", "source": "https://t.me/cvedetector/23215", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2903 - Google Cloud Platform OS Login SSH Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-2903 \nPublished : April 17, 2025, 7:15 a.m. | 56\u00a0minutes ago \nDescription : An attacker with knowledge of creating user accounts during VM deployment on Google Cloud Platform (GCP) using the OS Login feature, can login via SSH gaining command-line control of the operating system. This allows an attacker to gain access to sensitive data stored on the VM, install malicious software, and disrupt or disable the functionality of the VM. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T10:28:10.000000Z"}, {"uuid": "de82ab9e-3ffe-42cf-bdb2-c0bbb93de907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29032", "type": "seen", "source": "https://t.me/cvedetector/20300", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29032 - Tenda AC9 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29032 \nPublished : March 14, 2025, 2:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : Tenda AC9 v15.03.05.19(6318) was discovered to contain a buffer overflow via the formWifiWpsOOB function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:31.000000Z"}, {"uuid": "5a8de359-6718-4089-9435-03df59f06487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29031", "type": "seen", "source": "https://t.me/cvedetector/20299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29031 - Tenda AC6 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-29031 \nPublished : March 14, 2025, 2:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the fromAddressNat function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:31.000000Z"}, {"uuid": "5fc9e8a8-0a61-4301-be08-52f887288841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29030", "type": "seen", "source": "https://t.me/cvedetector/20298", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29030 - Tenda AC6 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29030 \nPublished : March 14, 2025, 2:15 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : Tenda AC6 v15.03.05.16 was discovered to contain a buffer overflow via the formWifiWpsOOB function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:30.000000Z"}, {"uuid": "ef591ac3-2110-49e4-9a9a-e733fd14a8a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2903", "type": "seen", "source": "Telegram/jrReKndJEIIsIC3ejcV3Cb0KdRjUvz--FOWMYVkZUyMQ3kk", "content": "", "creation_timestamp": "2025-04-17T10:00:35.000000Z"}, {"uuid": "6d9fe9d4-9514-452f-8ee2-3f343a34484c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29031", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lke2qgp2p726", "content": "", "creation_timestamp": "2025-03-14T16:46:12.631028Z"}, {"uuid": "644a2085-6d5d-4105-a3ec-314d53796d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29030", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lke2qh4s5p26", "content": "", "creation_timestamp": "2025-03-14T16:46:15.250098Z"}, {"uuid": "013d0726-0c2e-4071-bbdc-cc8b954bdc6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2903", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmywmxrq2524", "content": "", "creation_timestamp": "2025-04-17T10:48:55.440285Z"}, {"uuid": "06343d57-a415-4039-9205-63307793e846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2903", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114353492774012647", "content": "", "creation_timestamp": "2025-04-17T13:17:05.491082Z"}, {"uuid": "19cf6132-2e68-41e3-b1ad-32371e46dbf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29032", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lke2qg62qx26", "content": "", "creation_timestamp": "2025-03-14T16:46:09.500964Z"}]}