{"vulnerability": "cve-2025-4354", "sightings": [{"uuid": "54d3d6fd-f2f6-4fe1-8421-ac31e7b93db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43547", "type": "seen", "source": "https://t.me/cvedetector/25223", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43547 - Bridge File Integer Overflow Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-43547 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:27.000000Z"}, {"uuid": "28835eaa-2ab9-4078-a865-31ab7e2fb2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43546", "type": "seen", "source": "https://t.me/cvedetector/25222", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43546 - Oracle Bridge Integer Underflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43546 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:27.000000Z"}, {"uuid": "762162af-5177-41a8-88ba-5067225347ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43545", "type": "seen", "source": "https://t.me/cvedetector/25221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43545 - Adobe Bridge Uninitialized Pointer Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43545 \nPublished : May 13, 2025, 6:15 p.m. | 59\u00a0minutes ago \nDescription : Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T21:24:26.000000Z"}, {"uuid": "8b1f7a71-08dd-4615-9c41-afffc89fec4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4354", "type": "exploited", "source": "https://t.me/cvedetector/24601", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4354 - Tenda DAP-1520 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4354 \nPublished : May 6, 2025, 1:15 p.m. | 46\u00a0minutes ago \nDescription : A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Affected by this issue is the function check_dws_cookie of the file /storage. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T16:09:24.000000Z"}, {"uuid": "0fd2faaf-614b-40a4-9c0f-05b45bfe195e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4354", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loj3engfxl2j", "content": "", "creation_timestamp": "2025-05-06T14:21:32.637720Z"}, {"uuid": "9618e423-fe7b-4c17-9347-d82fce2a5a27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43547", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp36uywqtn22", "content": "", "creation_timestamp": "2025-05-13T19:21:21.773182Z"}, {"uuid": "94e1dea8-66c3-41e9-bd86-011b93281345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43545", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp36v6kvlo32", "content": "", "creation_timestamp": "2025-05-13T19:21:43.291630Z"}, {"uuid": "0b502034-e808-4d0b-82a0-5a2b98cda316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43546", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp376bptrtr2", "content": "", "creation_timestamp": "2025-05-13T19:23:59.411903Z"}, {"uuid": "598ab390-3680-42ef-a93e-609728c0eb0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43545", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eaf546m2j", "content": "", "creation_timestamp": "2025-05-13T20:48:13.085331Z"}, {"uuid": "62506d2d-7db9-43a8-a5d5-fc184415a8a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43547", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eafdsnv2h", "content": "", "creation_timestamp": "2025-05-13T20:48:14.477707Z"}, {"uuid": "cad7d085-89df-431b-b242-4b446449c5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43546", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3eafnvkr2r", "content": "", "creation_timestamp": "2025-05-13T20:48:16.372560Z"}, {"uuid": "6b90e7f9-78f1-473c-a4aa-240cb5a6a0c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43548", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3pehbmbt2p", "content": "", "creation_timestamp": "2025-05-14T00:07:15.045038Z"}, {"uuid": "e29d8483-983b-4342-ae73-7361a05363c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43549", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp3pei7kje2l", "content": "", "creation_timestamp": "2025-05-14T00:07:19.487335Z"}, {"uuid": "781c38a8-3dbf-42bd-934b-6a031729d8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43542", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/c5b7cfe4-31dc-48ad-9aad-8e8bd3c6bf83", "content": "", "creation_timestamp": "2025-12-16T06:48:31.589489Z"}, {"uuid": "4ff3818a-a7bc-4430-aa4b-803f854cc5b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43541", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/c5b7cfe4-31dc-48ad-9aad-8e8bd3c6bf83", "content": "", "creation_timestamp": "2025-12-16T06:48:31.589489Z"}, {"uuid": "ce2d82d7-e848-4c6e-825b-54729a3a1ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4354", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15116", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4354\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Affected by this issue is the function check_dws_cookie of the file /storage. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-06T12:31:05.656Z\n\ud83d\udccf Modified: 2025-05-06T12:31:05.656Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.307472\n2. https://vuldb.com/?ctiid.307472\n3. https://vuldb.com/?submit.564719\n4. https://github.com/Ghostsuzhijian/Iot-/blob/main/DAP-1520_replace_special_char/DAP-1520_replace_special_char.md\n5. https://www.tenda.com.cn/", "creation_timestamp": "2025-05-06T13:21:10.000000Z"}, {"uuid": "6910e9e0-fae3-458c-ac21-f3b899ff1f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43542", "type": "seen", "source": "Telegram/66rNhckXw4zokWNIHPPThoaB__3WddU1uelwxQvM_wROfLk", "content": "", "creation_timestamp": "2026-04-02T22:21:28.000000Z"}, {"uuid": "d7caa840-e55f-47ad-a865-9186562e5dff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43542", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7tat5jyss2q", "content": "", "creation_timestamp": "2025-12-12T23:34:01.982455Z"}, {"uuid": "d8489df6-bdd2-4300-9de9-27af7f1fe7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43548", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16228", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43548\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-05-13T20:15:26.481Z\n\ud83d\udccf Modified: 2025-05-13T20:15:26.481Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/dimension/apsb25-45.html", "creation_timestamp": "2025-05-13T20:31:08.000000Z"}, {"uuid": "a654b0f7-e38f-44ae-a1fa-c4a9b9a8709c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43541", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ma7ldzxppq2x", "content": "", "creation_timestamp": "2025-12-17T21:14:22.977393Z"}, {"uuid": "afdc335b-c97d-4a74-b4ea-de915c965b56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43541", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-1127/", "content": "", "creation_timestamp": "2025-12-17T05:00:00.000000Z"}, {"uuid": "202c1dfd-9549-45f1-8e9c-d31701802fab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-43542", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mj3pezdcua2g", "content": "", "creation_timestamp": "2026-04-09T21:02:45.367564Z"}, {"uuid": "5c9a0ed3-4a52-40db-991f-b0e47da59e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16223", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43549\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\ud83d\udccf Published: 2025-05-13T20:19:55.115Z\n\ud83d\udccf Modified: 2025-05-13T20:19:55.115Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html", "creation_timestamp": "2025-05-13T20:31:03.000000Z"}]}