{"vulnerability": "CVE-2025-23406", "sightings": [{"uuid": "b57f97ad-6e7a-4b4e-8f5b-83ee927b2779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4419", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23406\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Out-of-bounds read vulnerability caused by improper checking of TCP MSS option values exists in Cente middleware TCP/IP Network Series, which may lead to processing a specially crafted packet to cause the affected product crashed.\n\ud83d\udccf Published: 2025-02-14T06:30:36Z\n\ud83d\udccf Modified: 2025-02-14T06:30:36Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23406\n2. https://jvn.jp/en/vu/JVNVU92227620\n3. https://www.cente.jp/obstacle/5451", "creation_timestamp": "2025-02-14T07:09:49.000000Z"}, {"uuid": "bd9b0f9f-dc5e-4730-91d9-38eed80a2b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114000361569487992", "content": "", "creation_timestamp": "2025-02-14T04:31:10.764616Z"}, {"uuid": "25c3abfd-43be-4c42-a8c7-5d840c2d5ed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li4h3tsxy224", "content": "", "creation_timestamp": "2025-02-14T05:15:34.483117Z"}, {"uuid": "0449e511-0817-43f6-9039-55b61c1c0e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li4skdczwa2p", "content": "", "creation_timestamp": "2025-02-14T08:40:31.759600Z"}, {"uuid": "0d8f0d17-063a-4d83-8738-b75fffcea746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "f480298e-332c-469e-96b9-1db66248d261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4431", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23406\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-14T05:15:12.567\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://jvn.jp/en/vu/JVNVU92227620/\n2. https://www.cente.jp/obstacle/5451/", "creation_timestamp": "2025-02-14T07:12:07.000000Z"}, {"uuid": "604c9e22-c78b-4cc8-998a-2f4672fe6c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "Telegram/NdAvPbre_nhwox2bb6tfyBRK0s5xSLIu4wvbnEkSPjSeZIrM", "content": "", "creation_timestamp": "2025-02-14T21:08:28.000000Z"}, {"uuid": "1859c78d-85ec-45c7-9652-5bc0dcba5c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "https://t.me/cvedetector/18065", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23406 - \"Cente Middleware TCP/IP Network Series OOB Read Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-23406 \nPublished : Feb. 14, 2025, 5:15 a.m. | 39\u00a0minutes ago \nDescription : Out-of-bounds read vulnerability caused by improper checking of TCP MSS option values exists in Cente middleware TCP/IP Network Series, which may lead to processing a specially crafted packet to cause the affected product crashed. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T07:23:27.000000Z"}, {"uuid": "b9c2ef60-b39e-4d7d-8e5b-b49337c0df85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23406", "type": "seen", "source": "Telegram/PqEkGBoP_MKPXaGYzOW5mhP1XtcoN7VkLC46p6MgPzjPqGzy", "content": "", "creation_timestamp": "2025-02-14T10:09:24.000000Z"}]}