{"vulnerability": "CVE-2025-2563", "sightings": [{"uuid": "65d7f77a-1961-4c02-8628-dab95cd9fa29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lldhdf3oje2k", "content": "", "creation_timestamp": "2025-03-27T04:24:00.857639Z"}, {"uuid": "4229bafc-390e-402c-9c26-cdcfb579aa04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114116743857746801", "content": "", "creation_timestamp": "2025-03-06T17:48:43.837748Z"}, {"uuid": "9ecf192e-8991-4e4e-9d1c-1c076bfac1cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljqpb45qtk2t", "content": "", "creation_timestamp": "2025-03-07T00:00:08.629138Z"}, {"uuid": "aa968645-7ccd-472f-b9f0-899a2aee0679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljo5nkwucg2f", "content": "", "creation_timestamp": "2025-03-05T23:39:39.470771Z"}, {"uuid": "7ef72f1f-2502-4609-aa07-e58a14184438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25634", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljo5nlj3cc2j", "content": "", "creation_timestamp": "2025-03-05T23:39:41.258386Z"}, {"uuid": "4bb492aa-ec15-463f-a1a6-3fa78dec3c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-2563.yaml", "content": "", "creation_timestamp": "2025-04-05T06:37:30.000000Z"}, {"uuid": "4ea9f67c-a808-42f0-b975-071853330d14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmreed5kya24", "content": "", "creation_timestamp": "2025-04-14T10:33:21.725578Z"}, {"uuid": "7a683b71-4b7c-45f5-bfbe-665f491944bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114337336622665561", "content": "", "creation_timestamp": "2025-04-14T16:48:22.302994Z"}, {"uuid": "aef073d8-b2d2-4ee3-8c53-c8319c4a6177", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lpafxtrhmp2r", "content": "", "creation_timestamp": "2025-05-15T21:02:30.026059Z"}, {"uuid": "c52ce2e2-2e44-46c3-a76f-547038323093", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "2a63e754-619c-4869-981b-3a8b25f06146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "8b74ae9f-3d44-47be-9654-f2382835f629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25634", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "65311f55-68ae-4f5e-8cd7-1381b88cbe50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25634", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:47.000000Z"}, {"uuid": "ce82ede3-e0fc-4979-beb1-c9f2d4c4663a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:48.000000Z"}, {"uuid": "f2cf2e71-3fb1-45e5-b765-5a77fab3a2f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_user_registration_membership_escalation.rb", "content": "", "creation_timestamp": "2025-05-14T13:41:16.000000Z"}, {"uuid": "e8c8cafe-aeb8-4766-8aaf-3a8cf886609d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25635", "type": "seen", "source": "https://t.me/cvedetector/19178", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25635 - TOTOlink A3002R Buffer Overflow in boa\", \n  \"Content\": \"CVE ID : CVE-2025-25635 \nPublished : Feb. 28, 2025, 7:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T22:02:59.000000Z"}, {"uuid": "5b55c90d-e807-4989-88bd-f4505d7fc61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/26740", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-2563 PoC\nURL\uff1ahttps://github.com/ubaydev/CVE-2025-2563\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-29T12:05:35.000000Z"}, {"uuid": "72d992a5-bf41-4f2c-a6f7-fe7f1615c70d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6609", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25632\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T20:27:43.945Z\n\ud83d\udd17 References:\n1. https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19telnet.md", "creation_timestamp": "2025-03-05T20:36:44.000000Z"}, {"uuid": "cf7373c4-38dc-4d54-af1b-6dc55d00987d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25634", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6608", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25634\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability has been found in Tenda AC15 15.03.05.19 in the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow.\n\ud83d\udccf Published: 2025-03-05T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T20:29:59.644Z\n\ud83d\udd17 References:\n1. https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19GetParentControlInfo.md", "creation_timestamp": "2025-03-05T20:36:43.000000Z"}, {"uuid": "e8bdc602-8266-4dea-830c-37fcf804d7db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25635", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5960", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25635\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOlink A3002R V1.1.1-B20200824.0128 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the pppoe_dns1 parameter in the formIpv6Setup interface of /bin/boa.\n\ud83d\udccf Published: 2025-02-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T18:50:32.682Z\n\ud83d\udd17 References:\n1. https://github.com/SunnyYANGyaya/firmcrosser/blob/main/ToTolink/TOTOLINK-A3002R-formIpv6Setup-pppoe_dns1.md", "creation_timestamp": "2025-02-28T19:27:05.000000Z"}, {"uuid": "39d4034c-003b-431f-bffa-d0dbc46c9207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11583", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2563\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The User Registration &amp; Membership  WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges\n\ud83d\udccf Published: 2025-04-14T06:00:09.509Z\n\ud83d\udccf Modified: 2025-04-14T06:00:09.509Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2c0f62a1-9510-4f90-a297-17634e6c8b75/", "creation_timestamp": "2025-04-14T06:53:47.000000Z"}, {"uuid": "80eba3c9-6c2b-4bbb-a638-9d7931201e89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "Telegram/pmzKbihchBYeJvBnkfYLk5LESIxSAVi0zGHv3QahmixU_js", "content": "", "creation_timestamp": "2026-04-20T09:00:05.000000Z"}, {"uuid": "78ea81b0-909d-4b5d-b710-d4e44e7cb30e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "Telegram/T_t278HVRV5FNiuWOcnHRGLAtJdDH1ZkJoft_1GQHmwS1uI", "content": "", "creation_timestamp": "2026-04-20T03:00:09.000000Z"}, {"uuid": "3ae98753-2a13-49d6-8047-820dd054092a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "Telegram/56SNjB68nyULYTdkaeIILQI4ytkQLoACBGmTDoXIf258Id4", "content": "", "creation_timestamp": "2026-04-18T11:00:12.000000Z"}, {"uuid": "15b4607a-b883-47af-8c93-13a266a022ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "Telegram/O7yR2b4OLQp6kid0WdGHPQvQVIbLyZOFm8IdlAgSGDL0FUM", "content": "", "creation_timestamp": "2026-04-18T15:00:07.000000Z"}, {"uuid": "4f5fc975-accb-409c-b387-e5a08d1b185b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "Telegram/-QOyMiowJoIyiMyTWDmr53uOV1Gxrf1KetOkwLf9_gvu4z0", "content": "", "creation_timestamp": "2025-06-25T00:39:14.000000Z"}, {"uuid": "88a59869-fcf5-4cf9-a16a-08afe57e2558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "Telegram/EKi3juhW8KdvSrT-C52NnQYma9e80zcUs_26vGBIli1oz3UL", "content": "", "creation_timestamp": "2025-06-25T17:32:32.000000Z"}, {"uuid": "a6f12c6b-229a-4d03-8f66-65ced74a3729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "Telegram/nVjbyWi1OTQqVrCfCpVg9HGjFoxjWvVL_Heny3L18ja2tx5m", "content": "", "creation_timestamp": "2025-06-25T00:39:13.000000Z"}, {"uuid": "8274d39f-5832-46fc-ae51-50068b40b96e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "https://t.me/cvedetector/22831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2563 - \"WordPress User Registration &amp; Membership Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2563 \nPublished : April 14, 2025, 6:15 a.m. | 2\u00a0hours, 4\u00a0minutes ago \nDescription : The User Registration &amp; Membership  WordPress plugin before 4.1.2 does not prevent users to set their account role when the Membership Addon is enabled, leading to a privilege escalation issue and allowing unauthenticated users to gain admin privileges \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T10:28:53.000000Z"}, {"uuid": "ace0d8ef-aa4c-4233-bebe-742954a0ee6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25632", "type": "seen", "source": "https://t.me/cvedetector/19667", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25632 - Tenda AC15 Remote Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25632 \nPublished : March 5, 2025, 9:15 p.m. | 2\u00a0hours, 22\u00a0minutes ago \nDescription : Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T01:18:24.000000Z"}, {"uuid": "e991527b-3826-4e05-acf8-d34db7d8144f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25634", "type": "seen", "source": "https://t.me/cvedetector/19668", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25634 - Tenda AC15 Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25634 \nPublished : March 5, 2025, 9:15 p.m. | 2\u00a0hours, 22\u00a0minutes ago \nDescription : A vulnerability has been found in Tenda AC15 15.03.05.19 in the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T01:18:25.000000Z"}, {"uuid": "e95aa83f-1d48-46bc-8cc4-6c6f80c39587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "seen", "source": "Telegram/01jIZuykzV2ZEfUYuLOtc2ZkoWyJZmQDfLImJzcAZFdhESI", "content": "", "creation_timestamp": "2025-04-14T18:00:53.000000Z"}, {"uuid": "fb40b0a6-8a14-4f6c-a0bd-7a757f623a9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "Telegram/iXXrSRZXi-ojvdasxd-BMH7IqLKZibvE0e6rFuxhoF-GkT8", "content": "", "creation_timestamp": "2025-03-29T16:00:07.000000Z"}, {"uuid": "3b8102fc-298d-4943-bc74-edbdc7aed191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2563", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/771061", "content": "{\n  \"Source\": \"https://htdark.com/index.php\",\n  \"Content\": \"Metasploit - Add Unauthenticated privesc for WP User Registration &amp; Membership plugin (CVE-2025-2563)\", \n  \"author\": \" (dEEpEst)\",\n  \"Detection Date\": \"24 May 2025\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2025-05-24T10:28:08.000000Z"}]}