{"vulnerability": "cve-2025-2545", "sightings": [{"uuid": "e512375a-ef62-46f5-aa7a-8205bc790249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25458", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11941", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25458\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serverName2.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T22:25:31.914Z\n\ud83d\udd17 References:\n1. https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-serverName2-StackOverflow\n2. https://gist.github.com/xyqer1/d195ea1eb37ba1cc5f709b1d4fc1a2c6", "creation_timestamp": "2025-04-15T22:55:40.000000Z"}, {"uuid": "d2e751b4-ec15-4b2b-813c-999e0e7f28b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25456", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11905", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25456\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T20:34:29.442Z\n\ud83d\udd17 References:\n1. https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-mac2-StackOverflow\n2. https://gist.github.com/xyqer1/ab1e6a2bd369aaada0666639c843aff0", "creation_timestamp": "2025-04-15T20:55:06.000000Z"}, {"uuid": "ccf26ccd-e5de-4942-ae5d-b016fa31fab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25453", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11942", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25453\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serviceName2.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T22:24:06.493Z\n\ud83d\udd17 References:\n1. https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-serviceName2-StackOverflow\n2. https://gist.github.com/xyqer1/84dc6d8b3f92597d1d597b2799c2c45f", "creation_timestamp": "2025-04-15T22:55:41.000000Z"}, {"uuid": "adab6074-351d-47b7-94ee-e367c876e1a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25455", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12291", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25455\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanMTU2.\n\ud83d\udccf Published: 2025-04-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T17:51:55.484Z\n\ud83d\udd17 References:\n1. https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-wanMTU2-StackOverflow\n2. https://gist.github.com/xyqer1/6c865a9ec44b4797e78b6765cd5c84e5", "creation_timestamp": "2025-04-17T17:57:21.000000Z"}, {"uuid": "60783a97-3839-4f78-8478-e9d8c0565344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25457", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12265", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25457\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via cloneType2.\n\ud83d\udccf Published: 2025-04-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T15:48:58.702Z\n\ud83d\udd17 References:\n1. https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-cloneType2-StackOverflow\n2. https://gist.github.com/xyqer1/f69ebbdec019cacf5870ea55e25780a4", "creation_timestamp": "2025-04-17T15:57:51.000000Z"}, {"uuid": "fbdd4efb-6d85-459e-845d-7dd96ff5100b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25454", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12301", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25454\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanSpeed2.\n\ud83d\udccf Published: 2025-04-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T17:33:25.900Z\n\ud83d\udd17 References:\n1. https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-wanSpeed2-StackOverflow\n2. https://gist.github.com/xyqer1/491bfd8b9b0868977dca66ab6ce238d2", "creation_timestamp": "2025-04-17T17:57:36.000000Z"}, {"uuid": "a8b7aa43-8186-4389-bb29-a5a143ad5f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2545", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14844", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2545\n\ud83d\udd25 CVSS Score: 2.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Vulnerability in Best Practical Solutions, LLC's Request Tracker v5.0.7, where the Triple DES (3DES) cryptographic algorithm is used within SMIME code to encrypt S/MIME emails. Triple DES is considered obsolete and insecure due to its susceptibility to birthday attacks, which could compromise the confidentiality of encrypted messages.\n\ud83d\udccf Published: 2025-05-05T11:28:43.668Z\n\ud83d\udccf Modified: 2025-05-05T11:29:41.545Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/cryptographic-algorithm-not-recommended-request-tracker-best-practical", "creation_timestamp": "2025-05-05T12:20:45.000000Z"}, {"uuid": "d6debed5-de95-405b-96b9-54be1359de51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25455", "type": "seen", "source": "https://t.me/cvedetector/23272", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25455 - Tenda AC10 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25455 \nPublished : April 17, 2025, 6:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanMTU2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T23:01:10.000000Z"}, {"uuid": "164413b1-1708-48a2-be3e-9d599a10f6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25454", "type": "seen", "source": "https://t.me/cvedetector/23271", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25454 - Tenda AC10 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25454 \nPublished : April 17, 2025, 6:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via wanSpeed2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T23:01:09.000000Z"}, {"uuid": "1b6d0058-628c-4a9a-90f5-7e56f63324c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25458", "type": "seen", "source": "https://t.me/cvedetector/23039", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25458 - Tenda AC10 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25458 \nPublished : April 15, 2025, 11:15 p.m. | 2\u00a0hours, 8\u00a0minutes ago \nDescription : Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serverName2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T03:29:30.000000Z"}, {"uuid": "9328f8eb-e9b7-4752-81a8-38512041c215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25453", "type": "seen", "source": "https://t.me/cvedetector/23038", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25453 - Tenda AC10 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25453 \nPublished : April 15, 2025, 11:15 p.m. | 2\u00a0hours, 8\u00a0minutes ago \nDescription : Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via serviceName2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T03:29:29.000000Z"}, {"uuid": "73f80c54-ba8e-49ed-87b2-9d731b455839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25456", "type": "seen", "source": "https://t.me/cvedetector/23000", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25456 - Tenda AC10 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25456 \nPublished : April 15, 2025, 7:16 p.m. | 56\u00a0minutes ago \nDescription : Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T22:28:06.000000Z"}, {"uuid": "bb166c5a-34b1-4003-8963-2d3ead210482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25451", "type": "seen", "source": "Telegram/My_9mZil9QWoCdHsRZ395amlu9zHp9MhsLusHSoj-hqrIG2I", "content": "", "creation_timestamp": "2025-03-08T04:35:52.000000Z"}, {"uuid": "06d96d54-1cdb-44d2-9bbf-276feeaf0e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25450", "type": "seen", "source": "Telegram/3ZspW526t9OSP1br2Q9bV7j0kq7T2LZvD0cuadRc2HGKwmea", "content": "", "creation_timestamp": "2025-03-08T04:35:52.000000Z"}, {"uuid": "b987c3d8-0435-4981-ad62-7981b8ec507d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2545", "type": "seen", "source": "https://t.me/cvedetector/24450", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2545 - \"Best Practical Solutions, LLC Request Tracker Triple DES Encryption Weakness\"\", \n  \"Content\": \"CVE ID : CVE-2025-2545 \nPublished : May 5, 2025, 12:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Vulnerability in Best Practical Solutions, LLC's Request Tracker v5.0.7, where the Triple DES (3DES) cryptographic algorithm is used within SMIME code to encrypt S/MIME emails. Triple DES is considered obsolete and insecure due to its susceptibility to birthday attacks, which could compromise the confidentiality of encrypted messages. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T15:52:37.000000Z"}, {"uuid": "7cd0361c-e601-4ae8-b58a-ed6dd51f02b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25456", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414695060035", "content": "", "creation_timestamp": "2025-04-15T22:48:39.263920Z"}, {"uuid": "022c0590-b92d-453c-9532-16a9778dd426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25456", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd774zid2v", "content": "", "creation_timestamp": "2025-04-16T00:23:12.079057Z"}, {"uuid": "e6321845-4bae-404d-ba91-4f3f803d550a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25458", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvkzquepg2a", "content": "", "creation_timestamp": "2025-04-16T02:43:19.689181Z"}, {"uuid": "d86566d2-ec3a-4783-ab64-33d9fe6619dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25453", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvkzqxy6m2v", "content": "", "creation_timestamp": "2025-04-16T02:43:20.266514Z"}, {"uuid": "a67b820a-d87c-4678-8a36-95cc5d09eff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25457", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114354393757857085", "content": "", "creation_timestamp": "2025-04-17T17:06:13.272232Z"}, {"uuid": "69dbcbb2-81d8-454d-967c-53da6b324284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25455", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzrqxopnf2q", "content": "", "creation_timestamp": "2025-04-17T18:54:19.692582Z"}, {"uuid": "30ef81d7-c235-467a-9761-88711d33e50d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25454", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzrqyljt42g", "content": "", "creation_timestamp": "2025-04-17T18:54:23.382930Z"}, {"uuid": "1b13b1e6-f6b1-4107-b12d-a0dc4c81592a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2545", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3logrd7hbf72w", "content": "", "creation_timestamp": "2025-05-05T16:16:26.407990Z"}, {"uuid": "e57d5c92-7620-45d6-93f9-2e231b6f0b87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25450", "type": "seen", "source": "https://t.me/cvedetector/19704", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25450 - TaagSolutions MyTaag Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25450 \nPublished : March 6, 2025, 3:15 p.m. | 53\u00a0minutes ago \nDescription : An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the deactivation of the activated second factor to the /session endpoint \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:10:56.000000Z"}, {"uuid": "0272cdb1-9e6d-4d29-a7a0-23c0ef8b60a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25452", "type": "seen", "source": "https://t.me/cvedetector/19706", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25452 - TAAGSOLUTIONS GmbH MyTaag Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25452 \nPublished : March 6, 2025, 3:15 p.m. | 53\u00a0minutes ago \nDescription : An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a remote attacker to escalate privileges via the \"/user\" endpoint \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:10:57.000000Z"}, {"uuid": "ed8675e4-169b-411b-a2e7-b5f83ce6637b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25451", "type": "seen", "source": "https://t.me/cvedetector/19705", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25451 - MyTaag: Local Storage Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25451 \nPublished : March 6, 2025, 3:15 p.m. | 53\u00a0minutes ago \nDescription : An issue in TAAGSOLUTIONS GmbH MyTaag v.2024-11-24 and before allows a physically proximate attacker to escalate privileges via the \"2fa_authorized\" Local Storage key \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:10:56.000000Z"}, {"uuid": "d7427b5b-b4f5-48f8-a426-7ee5d130a2e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25452", "type": "seen", "source": "Telegram/ovDPT7ZiI4OUb_QNjE02AccyNtuBUqWap7PXfZ5rTFmMZsKW", "content": "", "creation_timestamp": "2025-03-08T04:35:52.000000Z"}, {"uuid": "3c93e8f5-42a1-4fad-9852-c4485c19caf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25451", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptkzlsma2f", "content": "", "creation_timestamp": "2025-03-06T15:44:36.693281Z"}, {"uuid": "f5b0cb3d-b759-4bde-8dbf-c29dce3d2d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25452", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljptl243f32f", "content": "", "creation_timestamp": "2025-03-06T15:44:37.967610Z"}]}