{"vulnerability": "CVE-2025-2566", "sightings": [{"uuid": "0630b02c-a93f-460a-9495-4fb04c996119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2566", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-175-01", "content": "", "creation_timestamp": "2025-06-24T10:00:00.000000Z"}, {"uuid": "4d2a75e8-240e-42c7-815f-8fb09fe53088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25662", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3linm6lnisq2v", "content": "", "creation_timestamp": "2025-02-21T01:01:51.473690Z"}, {"uuid": "2fa80370-26fd-46bc-9baf-805f0511257e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25663", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3linm6ltttk26", "content": "", "creation_timestamp": "2025-02-21T01:01:52.098790Z"}, {"uuid": "45a15702-f260-493b-8f11-94f7d61b5bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25664", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3linm6mhsv523", "content": "", "creation_timestamp": "2025-02-21T01:01:54.443798Z"}, {"uuid": "ffe5851f-cedb-455b-bfc5-df4fc1d6f930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25662", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605390129623", "content": "", "creation_timestamp": "2025-02-21T19:48:41.617184Z"}, {"uuid": "7cc9c5d5-c3cf-4a22-a98f-900e037346dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25663", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605435963762", "content": "", "creation_timestamp": "2025-02-21T19:48:41.864374Z"}, {"uuid": "01482ab1-2322-409e-bb0c-83963d247513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25664", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605527020934", "content": "", "creation_timestamp": "2025-02-21T19:48:42.018725Z"}, {"uuid": "fb5509fc-0da8-4202-a0ff-070d8897efc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25667", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605575919955", "content": "", "creation_timestamp": "2025-02-21T19:48:42.558393Z"}, {"uuid": "f940711f-487e-4584-b53d-89e815a5debc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25668", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605622614588", "content": "", "creation_timestamp": "2025-02-21T19:48:42.936715Z"}, {"uuid": "7fcb7ce5-1259-4f26-bc33-459323dfcb0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25662", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4836", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25662\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda O4 V3.0 V1.0.0.10(2936) is vulnerable to Buffer Overflow in the function SafeSetMacFilter of the file /goform/setMacFilterList via the argument remark/type/time.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:19:15.554Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/O4V3/setMacFilterList.md", "creation_timestamp": "2025-02-20T23:17:13.000000Z"}, {"uuid": "786f9d3e-886a-49e7-abb3-a0b6bda3e695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25668", "type": "seen", "source": "https://t.me/cvedetector/18611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25668 - Tenda AC8V4 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25668 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:55:15.000000Z"}, {"uuid": "bb33c8dc-1e2a-45ad-8720-97c4a9a72060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25667", "type": "seen", "source": "https://t.me/cvedetector/18610", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25667 - Tenda AC8V4 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25667 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:55:14.000000Z"}, {"uuid": "fa38771d-7116-48dd-a196-2303e82c41b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25667", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "38bd0f09-d3b3-4647-9265-dc898aa5500d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25664", "type": "seen", "source": "https://t.me/cvedetector/18609", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25664 - Tenda AC8V4 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25664 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:54:47.000000Z"}, {"uuid": "da8ff83c-73ce-4032-9902-a13e3c643aa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25663", "type": "seen", "source": "https://t.me/cvedetector/18608", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25663 - Tenda AC8V4 Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25663 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:54:46.000000Z"}, {"uuid": "ddba4153-5887-4707-a523-38c4f138156e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25662", "type": "seen", "source": "https://t.me/cvedetector/18607", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25662 - Tenda O4 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25662 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda O4 V3.0 V1.0.0.10(2936) is vulnerable to Buffer Overflow in the function SafeSetMacFilter of the file /goform/setMacFilterList via the argument remark/type/time. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:54:46.000000Z"}, {"uuid": "e6110e48-2679-4ec3-90f0-73013a8eec5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25667", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4826", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25667\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:31:13.839Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/saveParentControlInfo.md", "creation_timestamp": "2025-02-20T23:16:59.000000Z"}, {"uuid": "e2785e0c-5a4d-43ec-931a-522ea4d0ca4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25663", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4825", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25663\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:32:43.153Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/WifiExtraSet.md", "creation_timestamp": "2025-02-20T23:16:58.000000Z"}, {"uuid": "11b642a1-87cf-42dd-9364-6a2397a1b124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25664", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4830", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25664\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:28:25.102Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/SetIpMacBind.md", "creation_timestamp": "2025-02-20T23:17:05.000000Z"}, {"uuid": "a3463000-cde3-4187-9d2b-af978665fb0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25668", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4829", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25668\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:29:47.052Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/setMacFilterCfg.md", "creation_timestamp": "2025-02-20T23:17:04.000000Z"}]}