{"vulnerability": "cve-2025-2552", "sightings": [{"uuid": "baaef164-329f-471b-89e8-7b96cb9d7ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25522", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwenhqzew2a", "content": "", "creation_timestamp": "2025-02-11T19:15:46.283212Z"}, {"uuid": "4f43da0a-1f60-4ed1-8dc0-0cd49a6379a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25523", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwenkk7w42d", "content": "", "creation_timestamp": "2025-02-11T19:15:49.134440Z"}, {"uuid": "eec84815-34c9-4536-adb7-b8b807c66683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25524", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwenmtjoe2a", "content": "", "creation_timestamp": "2025-02-11T19:15:51.755534Z"}, {"uuid": "ccdb478d-097c-49b6-b79a-043f8b4ca0e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25527", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi2ww2sw2z", "content": "", "creation_timestamp": "2025-02-11T20:16:59.490957Z"}, {"uuid": "3cb3a0a5-17d0-4e80-ae10-007d69912b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25529", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi33fve22a", "content": "", "creation_timestamp": "2025-02-11T20:17:04.214655Z"}, {"uuid": "e2740acb-a731-43ba-9cf3-3240d69d5e1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25525", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi2rqkw22a", "content": "", "creation_timestamp": "2025-02-11T20:16:54.389834Z"}, {"uuid": "b4dceb64-5cd5-494c-9eea-c4da9699c33e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25526", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi2uferw2p", "content": "", "creation_timestamp": "2025-02-11T20:16:57.278865Z"}, {"uuid": "d7e6395c-b1d2-4906-a6f9-1a61719f2e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25528", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi2zblsr2s", "content": "", "creation_timestamp": "2025-02-11T20:17:02.330958Z"}, {"uuid": "b0df5bd3-daa1-483a-adaf-373044fdb236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25522", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwovxsxok2t", "content": "", "creation_timestamp": "2025-02-11T22:19:29.399976Z"}, {"uuid": "265793e7-7b79-4b4b-bdb9-5505082b45de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25523", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwovxwpev2i", "content": "", "creation_timestamp": "2025-02-11T22:19:29.980797Z"}, {"uuid": "ab4d3596-da27-461c-8982-5b5bc1321b29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25524", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhwovy3erq2v", "content": "", "creation_timestamp": "2025-02-11T22:19:30.551359Z"}, {"uuid": "e8aa2f43-7b11-41ee-a1e7-d815c0299b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25526", "type": "seen", "source": "https://t.me/cvedetector/17762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25526 - Mercury MIPC552W Camera Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25526 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Buffer overflow vulnerability in Mercury MIPC552W Camera v1.0 due to the lack of length verification, which is related to the configuration of the PPTP server. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:19.000000Z"}, {"uuid": "5204f0a6-d0b4-4f02-8f46-47c052adea55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25525", "type": "seen", "source": "https://t.me/cvedetector/17761", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25525 - H3C FA3010L Access Point Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25525 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Buffer overflow vulnerability in H3C FA3010L access points SWFA1B0V100R005 due to the lack of length verification, which is related to the setting of firewall rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:16.000000Z"}, {"uuid": "85589d2a-bec7-4eb4-9af4-dc50af502645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25527", "type": "seen", "source": "https://t.me/cvedetector/17760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25527 - Ruijie RG-NBR2600S Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25527 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Buffer overflow vulnerability in Ruijie RG-NBR2600S Gateway 10.3(4b12) due to the lack of length verification, which is related to the configuration of source address NAT rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:15.000000Z"}, {"uuid": "6a5e5803-a17a-4f06-9135-0ec3ddbad6e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25528", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3920", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25528\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:39.090\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/87f3a4412c46fa9c27d2f723136920b8", "creation_timestamp": "2025-02-11T21:12:39.000000Z"}, {"uuid": "6f291500-bd94-4f3c-bd31-856d79a93c93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25529", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3919", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25529\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:39.217\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/121e150c1cc100eab2cbd8ba3b55626b", "creation_timestamp": "2025-02-11T21:12:37.000000Z"}, {"uuid": "9e929eac-0efa-418e-ac50-c5b646fcbf40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25520", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114071918468630460", "content": "", "creation_timestamp": "2025-02-26T19:49:10.913253Z"}, {"uuid": "f8888778-0c51-495b-8c1c-15c1b72944a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25521", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114071918523132034", "content": "", "creation_timestamp": "2025-02-26T19:49:10.383726Z"}, {"uuid": "569e6456-69a1-4d8e-8a35-6ddc7ada81b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25529", "type": "seen", "source": "https://t.me/cvedetector/17758", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25529 - Digital China DCBC Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25529 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Buffer overflow vulnerability in Digital China DCBC Gateway 200-2.1.1 due to the lack of length verification, which is related to the configuration of static NAT rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:13.000000Z"}, {"uuid": "6b69aa30-feec-41ee-add8-dcd03bed440a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25528", "type": "seen", "source": "https://t.me/cvedetector/17757", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25528 - Wavlink WL-WN575A3 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25528 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Multiple buffer overflow vulnerabilities in Wavlink WL-WN575A3 RPT75A3.V4300, which are caused by not performing strict length checks on user-controlled data. By successfully exploiting the vulnerabilities, attackers can crash the remote devices or execute arbitrary commands without any authorization verification. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:13.000000Z"}, {"uuid": "d1d4049b-e8a9-4ae6-bb68-4a6c0746d2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25522", "type": "seen", "source": "https://t.me/cvedetector/17735", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25522 - Linksys WAP610N Remote Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25522 \nPublished : Feb. 11, 2025, 7:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Buffer overflow vulnerability in Linksys WAP610N v1.0.05.002 due to the lack of length verification, which is related to the time setting operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:24.000000Z"}, {"uuid": "a6e34f35-e15b-4824-b745-cf99c7748b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25523", "type": "seen", "source": "https://t.me/cvedetector/17733", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25523 - Trendnet TEG-40128 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25523 \nPublished : Feb. 11, 2025, 7:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Buffer overflow vulnerability in Trendnet TEG-40128 Web Smart Switch v1(1.00.023) due to the lack of length verification, which is related to the mobile access point setup operation. The attacker can directly control the remote target device by successfully exploiting this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:22.000000Z"}, {"uuid": "3fd0e183-3dd2-430c-aa46-33757a6cfee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25524", "type": "seen", "source": "https://t.me/cvedetector/17732", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25524 - TOTOLink X6000R Router Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25524 \nPublished : Feb. 11, 2025, 7:15 p.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Buffer overflow vulnerability in TOTOLink X6000R routers V9.4.0cu.652_B20230116 due to the lack of length verification, which is related to the addition of Wi-Fi filtering rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:21.000000Z"}, {"uuid": "427ca80e-4b09-4c51-98c9-05df6b56d55a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2552", "type": "seen", "source": "https://t.me/cvedetector/20746", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2552 - D-Link DIR-618 and DIR-605L Local Network Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2552 \nPublished : March 20, 2025, 5:15 p.m. | 55\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been declared as problematic. This vulnerability affects unknown code of the file /goform/formTcpipSetup. The manipulation leads to improper access controls. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T19:54:28.000000Z"}, {"uuid": "0a494534-163d-41d8-9082-4237d8ce1785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25520", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lj4ljpsufr2c", "content": "", "creation_timestamp": "2025-02-27T00:00:09.847237Z"}, {"uuid": "2e629cc8-c88b-4383-b3ce-47a5e5f6de5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25521", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lj4ljq242l22", "content": "", "creation_timestamp": "2025-02-27T00:00:10.454986Z"}, {"uuid": "ed0be73d-b931-4e1c-a543-0bf7428e9c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2552", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktlx4inni2n", "content": "", "creation_timestamp": "2025-03-20T21:04:01.821808Z"}, {"uuid": "09c6896d-1590-497a-afe6-93c3c308d76c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25521", "type": "seen", "source": "https://t.me/cvedetector/18932", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25521 - Seacms SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25521 \nPublished : Feb. 25, 2025, 10:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : Seacms &lt;=13.3\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-26T01:44:48.000000Z"}, {"uuid": "40a3bcb6-2a09-418b-8533-2a52a1755b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25520", "type": "seen", "source": "https://t.me/cvedetector/18931", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25520 - Seacms SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25520 \nPublished : Feb. 25, 2025, 10:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : Seacms &lt;13.3\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-26T01:44:45.000000Z"}, {"uuid": "e15c8e5e-7903-4771-aff9-ba3997cd40af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25525", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3923", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25525\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:38.727\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/d797c3cce41678028ff2d20c4e12137e", "creation_timestamp": "2025-02-11T21:12:51.000000Z"}, {"uuid": "3003b705-17fe-45f6-9ea3-35ad31783328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25526", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3922", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25526\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:38.850\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/5e3770d5e78e0aa5f9d51ba3882c35cd", "creation_timestamp": "2025-02-11T21:12:44.000000Z"}, {"uuid": "483eee0f-329a-4d60-bca6-c6948f1a8b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25527", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3921", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25527\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:38.973\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/354620285280aca98acba94a9c5fffb6", "creation_timestamp": "2025-02-11T21:12:41.000000Z"}, {"uuid": "6f6454b7-77c3-4972-85a4-59ac8e558e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25524", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4295", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25524\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T19:15:19.110\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/ce1f80afd2d8be8ca543437f16eae96b", "creation_timestamp": "2025-02-13T19:09:46.000000Z"}, {"uuid": "ecec7ca8-ee0b-406a-b21e-f5eaa8556cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25523", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4296", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25523\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T19:15:19.000\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/cb190038c9402c9f89681a0e116996f6", "creation_timestamp": "2025-02-13T19:09:50.000000Z"}, {"uuid": "7ef6ab58-738d-491d-8a2e-e7127e45f5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2552", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8234", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2552\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been declared as problematic. This vulnerability affects unknown code of the file /goform/formTcpipSetup. The manipulation leads to improper access controls. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.\n\ud83d\udccf Published: 2025-03-20T17:00:21.588Z\n\ud83d\udccf Modified: 2025-03-20T17:00:21.588Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300166\n2. https://vuldb.com/?ctiid.300166\n3. https://vuldb.com/?submit.516794\n4. https://lavender-bicycle-a5a.notion.site/D-Link-DIR-618-formTcpipSetup-1b053a41781f80fbbf94fda0c3b5ebfa?pvs=4\n5. https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formTcpipSetup-1b153a41781f80a7967ae08c81147a39?pvs=4\n6. https://www.dlink.com/", "creation_timestamp": "2025-03-20T17:18:42.000000Z"}]}