{"vulnerability": "CVE-2025-3786", "sightings": [{"uuid": "27d5f962-dc36-4cd7-b01b-7ce1d9e00ef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln3ikuqwlji2", "content": "", "creation_timestamp": "2025-04-18T11:15:19.159729Z"}, {"uuid": "004a8d32-b64b-452c-9345-82cb1703a841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114359036491292285", "content": "", "creation_timestamp": "2025-04-18T12:46:55.862939Z"}, {"uuid": "0e7271b0-706c-49db-8d74-ff21f2265d46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln42fqgdgn2r", "content": "", "creation_timestamp": "2025-04-18T16:34:31.563157Z"}, {"uuid": "72cb06e8-c8d1-4919-bc70-14b9e6eccd16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114360221222836607", "content": "", "creation_timestamp": "2025-04-18T17:48:13.612556Z"}, {"uuid": "425001da-b771-4b47-a033-09c48bc10cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-37867", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "884b03fe-a5c0-4b0d-9ba2-7c63722c3f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lncwex3g2h2d", "content": "", "creation_timestamp": "2025-04-21T10:11:03.682454Z"}, {"uuid": "750aa0f0-a109-4ad6-b3f2-08d4df675121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37861", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mgff4w63em24", "content": "", "creation_timestamp": "2026-03-06T13:10:09.953021Z"}, {"uuid": "d94b6ea9-9565-4cd5-9ff3-c0f6eaff1d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37869", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114479492858231080", "content": "", "creation_timestamp": "2025-05-09T19:20:33.917689Z"}, {"uuid": "b3c869bb-0925-44bf-b6a1-0b9b959b7317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-37860", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0397/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "f0af671c-0375-4784-9f1a-e3188098b93f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-37861", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "d0d9175a-0479-4b47-a5d2-49b8e62d8211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-37860", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20260408", "content": "", "creation_timestamp": "2026-04-07T18:00:00.000000Z"}, {"uuid": "100e2dc0-72ca-4a51-b2f9-8b07b5fb4cb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37861", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mlbgryvtcx2q", "content": "\ud83d\udd17 CVE : CVE-2024-41073, CVE-2024-53216, CVE-2025-37861, CVE-2025-40252, CVE-2025-68724, CVE-2025-68741, CVE-2025-71238, CVE-2026-23097, CVE-2026-23136, CVE-2026-23191, CVE-2026-23193, CVE-2026-23243, CVE-2026-23270, CVE-2026-23401, CVE-2026-31402, CVE-2026-31419, CVE-2026-31431, CVE-2026-31532", "creation_timestamp": "2026-05-07T14:35:10.309973Z"}, {"uuid": "e57e1881-1c32-40e7-90a5-38ee727d62e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37860", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12407", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37860\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nsfc: fix NULL dereferences in ef100_process_design_param()\n\nSince cited commit, ef100_probe_main() and hence also\n ef100_check_design_params() run before efx-&gt;net_dev is created;\n consequently, we cannot netif_set_tso_max_size() or _segs() at this\n point.\nMove those netif calls to ef100_probe_netdev(), and also replace\n netif_err within the design params code with pci_err.\n\ud83d\udccf Published: 2025-04-18T07:01:28.132Z\n\ud83d\udccf Modified: 2025-04-18T07:01:28.132Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e56391011381d6d029da377a65ac314cb3d5def2\n2. https://git.kernel.org/stable/c/8241ecec1cdc6699ae197d52d58e76bddd995fa5", "creation_timestamp": "2025-04-18T07:59:23.000000Z"}, {"uuid": "b5c2373f-b36d-433e-953f-3fd109e010f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12413", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3786\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in Tenda AC15 up to 15.03.05.19 and classified as critical. This issue affects the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument mac leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-18T09:00:23.217Z\n\ud83d\udccf Modified: 2025-04-18T09:00:23.217Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.305609\n2. https://vuldb.com/?ctiid.305609\n3. https://vuldb.com/?submit.553703\n4. https://github.com/CH13hh/cve/tree/AC15WifiExtraSet\n5. https://www.tenda.com.cn/", "creation_timestamp": "2025-04-18T09:59:00.000000Z"}, {"uuid": "b0a3d62b-4d5e-4ab6-8c06-93c217e8ea4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3786", "type": "published-proof-of-concept", "source": "Telegram/J6-YRih7z8cR8rFeyp9RZpIGSbXlufFD6LMHeh3O0VicODw", "content": "", "creation_timestamp": "2025-04-18T12:30:29.000000Z"}, {"uuid": "ecc8e633-b433-421d-9879-048373e1a8d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-37861", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/redhat-linux-kernel-multiple-vulnerabilities_20260508", "content": "", "creation_timestamp": "2026-05-07T20:00:00.000000Z"}]}