<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 23:55:25 +0000</lastBuildDate>
    <item>
      <title>3765ca56-8624-4af0-8ec9-60548b07238b</title>
      <link>https://vulnerability.circl.lu/sighting/3765ca56-8624-4af0-8ec9-60548b07238b/export</link>
      <description>{"uuid": "3765ca56-8624-4af0-8ec9-60548b07238b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2993", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9639", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2993\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is some unknown functionality of the file /default.cfg. The manipulation of the argument these leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-31T11:31:07.084Z\n\ud83d\udccf Modified: 2025-03-31T12:03:20.520Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302042\n2. https://vuldb.com/?ctiid.302042\n3. https://vuldb.com/?submit.523416\n4. https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-default-cfg-1bc53a41781f806d8016cd4e73ca4d6f?pvs=4\n5. https://www.tenda.com.cn/", "creation_timestamp": "2025-03-31T12:31:51.000000Z"}</description>
      <content:encoded>{"uuid": "3765ca56-8624-4af0-8ec9-60548b07238b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2993", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9639", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2993\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is some unknown functionality of the file /default.cfg. The manipulation of the argument these leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-31T11:31:07.084Z\n\ud83d\udccf Modified: 2025-03-31T12:03:20.520Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302042\n2. https://vuldb.com/?ctiid.302042\n3. https://vuldb.com/?submit.523416\n4. https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-default-cfg-1bc53a41781f806d8016cd4e73ca4d6f?pvs=4\n5. https://www.tenda.com.cn/", "creation_timestamp": "2025-03-31T12:31:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3765ca56-8624-4af0-8ec9-60548b07238b/export</guid>
      <pubDate>Mon, 31 Mar 2025 12:31:51 +0000</pubDate>
    </item>
    <item>
      <title>9266c1f5-e70d-47d5-89e3-2af8500d6c96</title>
      <link>https://vulnerability.circl.lu/sighting/9266c1f5-e70d-47d5-89e3-2af8500d6c96/export</link>
      <description>{"uuid": "9266c1f5-e70d-47d5-89e3-2af8500d6c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2993", "type": "seen", "source": "https://t.me/cvedetector/21582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2993 - Tenda FH1202 Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2993 \nPublished : March 31, 2025, 12:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is some unknown functionality of the file /default.cfg. The manipulation of the argument these leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T15:00:49.000000Z"}</description>
      <content:encoded>{"uuid": "9266c1f5-e70d-47d5-89e3-2af8500d6c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2993", "type": "seen", "source": "https://t.me/cvedetector/21582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2993 - Tenda FH1202 Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2993 \nPublished : March 31, 2025, 12:15 p.m. | 33\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.14(408). Affected by this issue is some unknown functionality of the file /default.cfg. The manipulation of the argument these leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T15:00:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9266c1f5-e70d-47d5-89e3-2af8500d6c96/export</guid>
      <pubDate>Mon, 31 Mar 2025 15:00:49 +0000</pubDate>
    </item>
    <item>
      <title>348d48b3-b434-40cf-8788-df223e4bad58</title>
      <link>https://vulnerability.circl.lu/sighting/348d48b3-b434-40cf-8788-df223e4bad58/export</link>
      <description>{"uuid": "348d48b3-b434-40cf-8788-df223e4bad58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29931", "type": "seen", "source": "https://t.me/cvedetector/23224", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29931 - \"TeleControl Server Basic Remote DoS Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-29931 \nPublished : April 17, 2025, 11:15 a.m. | 57\u00a0minutes ago \nDescription : A vulnerability has been identified in TeleControl Server Basic (All versions &amp;lt; V3.1.2.2). The affected product does not properly validate a length field in a serialized message which it uses to determine the amount of memory to be allocated for deserialization. This could allow an unauthenticated remote attacker to cause the application to allocate exhaustive amounts of memory and subsequently create a partial denial of service condition.  \nSuccessful exploitation is only possible in redundant Telecontrol Server Basic setups and only if the connection between the redundant servers has been disrupted. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T14:39:03.000000Z"}</description>
      <content:encoded>{"uuid": "348d48b3-b434-40cf-8788-df223e4bad58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29931", "type": "seen", "source": "https://t.me/cvedetector/23224", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29931 - \"TeleControl Server Basic Remote DoS Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-29931 \nPublished : April 17, 2025, 11:15 a.m. | 57\u00a0minutes ago \nDescription : A vulnerability has been identified in TeleControl Server Basic (All versions &amp;lt; V3.1.2.2). The affected product does not properly validate a length field in a serialized message which it uses to determine the amount of memory to be allocated for deserialization. This could allow an unauthenticated remote attacker to cause the application to allocate exhaustive amounts of memory and subsequently create a partial denial of service condition.  \nSuccessful exploitation is only possible in redundant Telecontrol Server Basic setups and only if the connection between the redundant servers has been disrupted. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T14:39:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/348d48b3-b434-40cf-8788-df223e4bad58/export</guid>
      <pubDate>Thu, 17 Apr 2025 14:39:03 +0000</pubDate>
    </item>
    <item>
      <title>920fd53c-7027-4300-b282-6d1bad03ef7e</title>
      <link>https://vulnerability.circl.lu/sighting/920fd53c-7027-4300-b282-6d1bad03ef7e/export</link>
      <description>{"uuid": "920fd53c-7027-4300-b282-6d1bad03ef7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29931", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmze2iaqzc2b", "content": "", "creation_timestamp": "2025-04-17T14:49:06.975856Z"}</description>
      <content:encoded>{"uuid": "920fd53c-7027-4300-b282-6d1bad03ef7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29931", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmze2iaqzc2b", "content": "", "creation_timestamp": "2025-04-17T14:49:06.975856Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/920fd53c-7027-4300-b282-6d1bad03ef7e/export</guid>
      <pubDate>Thu, 17 Apr 2025 14:49:06 +0000</pubDate>
    </item>
    <item>
      <title>9d9c47b8-5768-4e0e-a64a-51edaccb8543</title>
      <link>https://vulnerability.circl.lu/sighting/9d9c47b8-5768-4e0e-a64a-51edaccb8543/export</link>
      <description>{"uuid": "9d9c47b8-5768-4e0e-a64a-51edaccb8543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29931", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-112-02", "content": "", "creation_timestamp": "2025-04-22T10:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "9d9c47b8-5768-4e0e-a64a-51edaccb8543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29931", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-112-02", "content": "", "creation_timestamp": "2025-04-22T10:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9d9c47b8-5768-4e0e-a64a-51edaccb8543/export</guid>
      <pubDate>Tue, 22 Apr 2025 10:00:00 +0000</pubDate>
    </item>
    <item>
      <title>5b61a82b-c1fd-4504-94b0-2d60c2bcb0f0</title>
      <link>https://vulnerability.circl.lu/sighting/5b61a82b-c1fd-4504-94b0-2d60c2bcb0f0/export</link>
      <description>{"uuid": "5b61a82b-c1fd-4504-94b0-2d60c2bcb0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29930", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}</description>
      <content:encoded>{"uuid": "5b61a82b-c1fd-4504-94b0-2d60c2bcb0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29930", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5b61a82b-c1fd-4504-94b0-2d60c2bcb0f0/export</guid>
      <pubDate>Tue, 12 Aug 2025 13:33:27 +0000</pubDate>
    </item>
    <item>
      <title>d0a39bcc-7ed2-4aa4-a8ae-2e4cbd15adfb</title>
      <link>https://vulnerability.circl.lu/sighting/d0a39bcc-7ed2-4aa4-a8ae-2e4cbd15adfb/export</link>
      <description>{"uuid": "d0a39bcc-7ed2-4aa4-a8ae-2e4cbd15adfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29930", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:26.000000Z"}</description>
      <content:encoded>{"uuid": "d0a39bcc-7ed2-4aa4-a8ae-2e4cbd15adfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29930", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d0a39bcc-7ed2-4aa4-a8ae-2e4cbd15adfb/export</guid>
      <pubDate>Thu, 21 Aug 2025 03:19:26 +0000</pubDate>
    </item>
    <item>
      <title>25dcef84-8978-4629-b0a3-783f78921f02</title>
      <link>https://vulnerability.circl.lu/sighting/25dcef84-8978-4629-b0a3-783f78921f02/export</link>
      <description>{"uuid": "25dcef84-8978-4629-b0a3-783f78921f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29934", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m65znsznxt2s", "content": "", "creation_timestamp": "2025-11-21T19:34:41.871524Z"}</description>
      <content:encoded>{"uuid": "25dcef84-8978-4629-b0a3-783f78921f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29934", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m65znsznxt2s", "content": "", "creation_timestamp": "2025-11-21T19:34:41.871524Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/25dcef84-8978-4629-b0a3-783f78921f02/export</guid>
      <pubDate>Fri, 21 Nov 2025 19:34:41 +0000</pubDate>
    </item>
    <item>
      <title>ddee32af-f6c6-40fa-8d4e-e1c93c775d8d</title>
      <link>https://vulnerability.circl.lu/sighting/ddee32af-f6c6-40fa-8d4e-e1c93c775d8d/export</link>
      <description>{"uuid": "ddee32af-f6c6-40fa-8d4e-e1c93c775d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29933", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6ftemkp252w", "content": "", "creation_timestamp": "2025-11-24T22:03:27.298406Z"}</description>
      <content:encoded>{"uuid": "ddee32af-f6c6-40fa-8d4e-e1c93c775d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29933", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6ftemkp252w", "content": "", "creation_timestamp": "2025-11-24T22:03:27.298406Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddee32af-f6c6-40fa-8d4e-e1c93c775d8d/export</guid>
      <pubDate>Mon, 24 Nov 2025 22:03:27 +0000</pubDate>
    </item>
    <item>
      <title>3277816d-ff4a-4455-b5c8-656be6a17ffb</title>
      <link>https://vulnerability.circl.lu/sighting/3277816d-ff4a-4455-b5c8-656be6a17ffb/export</link>
      <description>{"uuid": "3277816d-ff4a-4455-b5c8-656be6a17ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-29934", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "3277816d-ff4a-4455-b5c8-656be6a17ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-29934", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3277816d-ff4a-4455-b5c8-656be6a17ffb/export</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate>
    </item>
  </channel>
</rss>
