{"vulnerability": "cve-2025-4368", "sightings": [{"uuid": "51104c07-1a89-4e4b-811f-5ce232c793ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4368", "type": "exploited", "source": "https://t.me/cvedetector/24629", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4368 - Tenda AC8 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4368 \nPublished : May 6, 2025, 4:15 p.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in Tenda AC8 16.03.34.06. Affected is the function formGetRouterStatus of the file /goform/MtuSetMacWan. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:20.000000Z"}, {"uuid": "972db38c-c906-453e-b5b4-db81224f42fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4368", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojis626lq2h", "content": "", "creation_timestamp": "2025-05-06T18:21:45.088394Z"}]}