{"vulnerability": "CVE-2025-2921", "sightings": [{"uuid": "89dabbf2-13fe-4e2a-89d1-54a303b40e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29214", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29214\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AX12 v22.03.01.46_CN was discovered to contain a stack overflow via the sub_42F69C function at /goform/setMacFilterCfg.\n\ud83d\udccf Published: 2025-03-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-20T15:49:57.604Z\n\ud83d\udd17 References:\n1. https://github.com/isstabber/my_VulnHub/blob/main/Tenda/AX12/tenda_ax12_setMacFilterCfg_stack_overflow_en.pdf\n2. https://gist.github.com/isstabber/85fe01ed47ad7ef820f86bfbd64a022c", "creation_timestamp": "2025-03-20T16:18:15.000000Z"}, {"uuid": "0f09be1c-aa8c-43c3-880d-2cb99d4fee90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2921", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9416", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2921\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in Netis WF-2404 1.1.124EN. Affected is an unknown function of the file /etc/passwd. The manipulation with the input Realtek leads to use of default password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-28T18:00:12.428Z\n\ud83d\udccf Modified: 2025-03-28T18:00:12.428Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.301896\n2. https://vuldb.com/?ctiid.301896\n3. https://vuldb.com/?submit.521038\n4. https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont", "creation_timestamp": "2025-03-28T18:28:13.000000Z"}, {"uuid": "9b16013d-f4b1-458c-9f2d-3617e8209f80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29213", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12135", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29213\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A zip slip vulnerability in the component \\service\\migrate\\MigrateForm.java of JEEWMS v3.7 allows attackers to execute arbitrary code via a crafted Zip file.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-16T18:34:29.675Z\n\ud83d\udd17 References:\n1. https://github.com/wy876/cve/issues/7", "creation_timestamp": "2025-04-16T18:56:14.000000Z"}, {"uuid": "e60c3a48-29fd-4061-854a-5df19578917e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29213", "type": "seen", "source": "https://t.me/cvedetector/23002", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29213 - JEEWMS Zip Slip Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-29213 \nPublished : April 15, 2025, 7:16 p.m. | 56\u00a0minutes ago \nDescription : A zip slip vulnerability in the component \\service\\migrate\\MigrateForm.java of JEEWMS v3.7 allows attackers to execute arbitrary code via a crafted Zip file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T22:28:10.000000Z"}, {"uuid": "af79ef87-c658-41c1-b1e6-55412f16d606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2921", "type": "seen", "source": "https://t.me/cvedetector/21458", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2921 - Netis WF-2404 Default Password Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2921 \nPublished : March 28, 2025, 6:15 p.m. | 18\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in Netis WF-2404 1.1.124EN. Affected is an unknown function of the file /etc/passwd. The manipulation with the input Realtek leads to use of default password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T20:16:01.000000Z"}, {"uuid": "12a66484-15d3-464b-bf64-d6be3df732fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29218", "type": "seen", "source": "https://t.me/cvedetector/20763", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29218 - Tenda W18E Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29218 \nPublished : March 20, 2025, 7:15 p.m. | 59\u00a0minutes ago \nDescription : Tenda W18E v2.0 v16.01.0.11 was discovered to contain a stack overflow in the wifiPwd parameter at /goform/setModules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T21:35:01.000000Z"}, {"uuid": "1c5f0604-e3ff-4e33-ab37-cc1f237df588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29217", "type": "seen", "source": "https://t.me/cvedetector/20762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29217 - Tenda W18E Stack Overflow Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29217 \nPublished : March 20, 2025, 7:15 p.m. | 59\u00a0minutes ago \nDescription : Tenda W18E v2.0 v16.01.0.11 was discovered to contain a stack overflow in the wifiSSID parameter at /goform/setModules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T21:35:00.000000Z"}, {"uuid": "49182d45-a6fa-432e-8ae8-f53d53eca9a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29214", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkt6sksydw2s", "content": "", "creation_timestamp": "2025-03-20T17:08:52.927861Z"}, {"uuid": "053e0972-d254-4d4a-956a-60d3e1774de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29215", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktlxaljyc26", "content": "", "creation_timestamp": "2025-03-20T21:04:08.171042Z"}, {"uuid": "1a990eb0-de14-4a1b-9266-0c6a153e0671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29215", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8256", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29215\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AX12 v22.03.01.46_CN was discovered to contain a stack overflow via the sub_43fdcc function at /goform/SetNetControlList.\n\ud83d\udccf Published: 2025-03-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-20T17:48:04.630Z\n\ud83d\udd17 References:\n1. https://github.com/isstabber/my_VulnHub/blob/main/Tenda/AX12/tenda_ax12v1_setnetcontrollist_stack_overflow.pdf\n2. https://gist.github.com/isstabber/a42b32a7dcd401d79c5866247329cddd", "creation_timestamp": "2025-03-20T18:20:54.000000Z"}, {"uuid": "0f3e6ad6-2ac1-4391-a1d9-049b67956a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29215", "type": "seen", "source": "https://t.me/cvedetector/20769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29215 - Tenda AX12 Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29215 \nPublished : March 20, 2025, 6:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : Tenda AX12 v22.03.01.46_CN was discovered to contain a stack overflow via the sub_43fdcc function at /goform/SetNetControlList. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T21:35:12.000000Z"}, {"uuid": "a9bd34ab-19da-408f-8e8e-bd9d45dcd1f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29214", "type": "seen", "source": "https://t.me/cvedetector/20758", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29214 - Tenda AX12 HTTP Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29214 \nPublished : March 20, 2025, 4:15 p.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : Tenda AX12 v22.03.01.46_CN was discovered to contain a stack overflow via the sub_42F69C function at /goform/setMacFilterCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T19:54:43.000000Z"}]}