{"vulnerability": "CVE-2025-2567", "sightings": [{"uuid": "4ddb2968-ac5e-431d-8e7f-ba0faccf91e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2567", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-05", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "deda5969-db9f-457e-bdf6-623558b1d404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25679", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3linm6m26py2y", "content": "", "creation_timestamp": "2025-02-21T01:01:52.766531Z"}, {"uuid": "835e7fac-b9ac-4b68-97eb-9aa6105d18e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25674", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605695675117", "content": "", "creation_timestamp": "2025-02-21T19:48:44.773294Z"}, {"uuid": "cf9f3d7e-295c-4e2f-a2a1-631ecc59a57b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25675", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605781963773", "content": "", "creation_timestamp": "2025-02-21T19:48:45.252100Z"}, {"uuid": "ec412569-78cd-4bae-87b7-111005057061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25676", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605835091412", "content": "", "creation_timestamp": "2025-02-21T19:48:45.941660Z"}, {"uuid": "52ed01e0-4dea-4182-b11a-e21307a04c6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25678", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114043605876404756", "content": "", "creation_timestamp": "2025-02-21T19:48:46.910704Z"}, {"uuid": "cd086f01-d34c-4dcf-9664-d63b8d365361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2567", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114344414733612454", "content": "", "creation_timestamp": "2025-04-15T22:48:41.115675Z"}, {"uuid": "eb86cfef-451a-4a96-a0ef-6954e870fe14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2567", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvd77xoen2c", "content": "", "creation_timestamp": "2025-04-16T00:23:16.081342Z"}, {"uuid": "41fe2e83-e6a6-436c-8c55-2e3d9b2ba4be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25675", "type": "seen", "source": "https://t.me/cvedetector/18614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25675 - Tenda AC10 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25675 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AC10 V1.0 V15.03.06.23 has a command injection vulnerablility located in the formexeCommand function. The str variable receives the cmdinput parameter from a POST request and is later assigned to the cmd_buf variable, which is directly used in the doSystemCmd function, causing an arbitrary command execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:56:10.000000Z"}, {"uuid": "a26f3700-e542-4fcf-90ca-428d02cccd7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25675", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "c557176d-9148-4459-9fb0-1fc467034799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25676", "type": "seen", "source": "https://t.me/cvedetector/18613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25676 - Tenda i12 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25676 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:55:49.000000Z"}, {"uuid": "a091ac08-30e2-486d-ad85-d229a6cdead3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25674", "type": "seen", "source": "https://t.me/cvedetector/18612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25674 - Tenda AC10 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25674 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:55:43.000000Z"}, {"uuid": "f94fbf40-b96e-4494-b42c-f70522f67698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25679", "type": "seen", "source": "https://t.me/cvedetector/18604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25679 - Tenda i12 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-25679 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:53:18.000000Z"}, {"uuid": "5825b027-3c09-4a8b-9fca-3b5ec0323d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25678", "type": "seen", "source": "https://t.me/cvedetector/18603", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25678 - Tenda i12 Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25678 \nPublished : Feb. 20, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T00:52:51.000000Z"}, {"uuid": "66e92079-611c-486d-9e60-860baa4edd05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25676", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4833", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25676\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:23:56.707Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md", "creation_timestamp": "2025-02-20T23:17:11.000000Z"}, {"uuid": "34ea825d-28c9-4e52-baec-b01f947de232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25679", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4832", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25679\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:25:12.140Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/WifiMacFilterSet.md", "creation_timestamp": "2025-02-20T23:17:07.000000Z"}, {"uuid": "1428348d-40f6-4bff-8161-cd4c74b1f485", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25678", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4831", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25678\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:27:03.243Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/setcfm.md", "creation_timestamp": "2025-02-20T23:17:06.000000Z"}, {"uuid": "d9dd8329-5ec9-45db-84ea-ad9a6cc9ea94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25675", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4835", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25675\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V1.0 V15.03.06.23 has a command injection vulnerablility located in the formexeCommand function. The str variable receives the cmdinput parameter from a POST request and is later assigned to the cmd_buf variable, which is directly used in the doSystemCmd function, causing an arbitrary command execution.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:21:10.807Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/AC10V1/formexeCommand.md", "creation_timestamp": "2025-02-20T23:17:12.000000Z"}, {"uuid": "af818063-0eb4-4af3-bc9e-cbba69126cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25674", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4834", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25674\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid.\n\ud83d\udccf Published: 2025-02-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-20T22:22:44.707Z\n\ud83d\udd17 References:\n1. https://github.com/jangfan/my-vuln/blob/main/Tenda/AC10V1/fast_setting_wifi_set.md", "creation_timestamp": "2025-02-20T23:17:12.000000Z"}, {"uuid": "4890a6d0-2f7f-4cdd-b29a-dc9dd9ff850c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2567", "type": "seen", "source": "https://t.me/cvedetector/23014", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2567 - \"Rockwell Automation Fuel Monitoring System Configuration Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2567 \nPublished : April 15, 2025, 8:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : An attacker could modify or disable settings, disrupt fuel monitoring   \nand supply chain operations, leading to disabling of ATG monitoring.   \nThis would result in potential safety hazards in fuel storage and   \ntransportation. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T00:08:34.000000Z"}]}