{"vulnerability": "CVE-2025-4417", "sightings": [{"uuid": "9c65223e-e78c-4502-96a3-e902f76eceed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4417", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-09", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "4e2060a6-3cb7-4055-8728-9387cbf73a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44172", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3lqn5efgro7s2", "content": "", "creation_timestamp": "2025-06-02T15:59:41.102793Z"}, {"uuid": "41c1971c-1258-49d7-b40f-82466e616334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44172", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqndilrkyo2s", "content": "", "creation_timestamp": "2025-06-02T17:47:56.061847Z"}, {"uuid": "72186052-42b5-47fe-9600-4e35a361fd9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44177", "type": "seen", "source": "https://gist.github.com/stSLAYER/4a2ecfbab1215a0be0dde59c4ac0122d", "content": "", "creation_timestamp": "2025-07-01T18:26:50.000000Z"}, {"uuid": "89ba4b66-2cc9-4c95-b2f8-7f0d1906100d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44178", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115089922710164590", "content": "", "creation_timestamp": "2025-08-25T14:40:55.710128Z"}, {"uuid": "11bd73ae-c527-457c-9639-9b58ace85585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44177", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lu334jmv3r2t", "content": "", "creation_timestamp": "2025-07-16T09:10:52.880393Z"}, {"uuid": "ea539428-2490-4a8b-b682-0e0f55c80121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44176", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2dwafi2j", "content": "", "creation_timestamp": "2025-05-12T18:47:50.078695Z"}, {"uuid": "84793afa-d231-4109-9640-b7dd56c7541e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44175", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loyn2fpg6g2t", "content": "", "creation_timestamp": "2025-05-12T18:48:00.295035Z"}, {"uuid": "d35f2aba-d1ed-4e16-9fef-78a8aba6a96a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44177", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lu6tdmpcqi2x", "content": "", "creation_timestamp": "2025-07-17T21:02:34.721521Z"}, {"uuid": "a61db227-0609-4859-94ed-0e14c758c7c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44177", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvekdkjh5x22", "content": "", "creation_timestamp": "2025-08-01T21:02:27.440580Z"}, {"uuid": "ba3e9939-37cf-4d79-81e7-a72bedf0ca51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44177", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-44177.yaml", "content": "", "creation_timestamp": "2025-07-29T15:11:52.000000Z"}, {"uuid": "88eeb72f-db6b-4699-94f5-25c788afacf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44177", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwfafkzdpb25", "content": "", "creation_timestamp": "2025-08-14T21:02:29.416327Z"}, {"uuid": "09d45ee8-47f2-4c74-8261-ad64906906f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44175", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15972", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-44175\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 v4 V16.03.10.13 is vulnerable to Buffer Overflow in the GetParentControlInfo function.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T17:09:00.721Z\n\ud83d\udd17 References:\n1. https://github.com/xubeining/Cve_report/blob/main/The%20router%20Tenda%20AC10%20v4%20V16.03.10.13%20of%20Shenzhen%20Jixiang%20Tenda%20Technology%20Co.%2C%20Ltd.%20has%20a%20heap%20overflow%20vulnerability.md", "creation_timestamp": "2025-05-12T18:26:54.000000Z"}, {"uuid": "15350d85-77d5-46ff-b985-598b1b2b0c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4417", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18228", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4417\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: A cross-site scripting vulnerability exists in \nAVEVA\u00a0PI Connector for CygNet \nVersions 1.6.14 and prior that, if exploited, could allow an \nadministrator miscreant with local access to the connector admin portal \nto persist arbitrary JavaScript code that will be executed by other \nusers who visit affected pages.\n\ud83d\udccf Published: 2025-06-12T19:32:32.628Z\n\ud83d\udccf Modified: 2025-06-12T19:57:09.559Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-09\n2. https://www.aveva.com/en/support-and-success/cyber-security-updates/", "creation_timestamp": "2025-06-12T20:34:22.000000Z"}, {"uuid": "ca3da2e5-1c2d-4a53-b748-6ca1da2e901b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44175", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15936", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-44175\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 v4 V16.03.10.13 is vulnerable to Buffer Overflow in the GetParentControlInfo function.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T17:09:00.721Z\n\ud83d\udd17 References:\n1. https://github.com/xubeining/Cve_report/blob/main/The%20router%20Tenda%20AC10%20v4%20V16.03.10.13%20of%20Shenzhen%20Jixiang%20Tenda%20Technology%20Co.%2C%20Ltd.%20has%20a%20heap%20overflow%20vulnerability.md", "creation_timestamp": "2025-05-12T18:24:00.000000Z"}, {"uuid": "3b324d37-80c2-4893-b1d9-e9fb7ad2b2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44176", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15934", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-44176\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda FH451 V1.0.0.9 is vulnerable to Remote Code Execution in the formSafeEmailFilter function.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T17:11:06.168Z\n\ud83d\udd17 References:\n1. https://github.com/xubeining/Cve_report/blob/main/Notification%20of%20Remote%20Code%20Execution%20Vulnerability%20in%20Tenda%20FH451%20Router%20%28Version%20V1.0.0.9%29%20by%20Shenzhen%20Jixiang%20Tenda%20Technology.md", "creation_timestamp": "2025-05-12T18:23:58.000000Z"}, {"uuid": "299ddc9b-48dc-4c70-98a0-d7b361c8a537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44175", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15955", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-44175\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AC10 v4 V16.03.10.13 is vulnerable to Buffer Overflow in the GetParentControlInfo function.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T17:09:00.721Z\n\ud83d\udd17 References:\n1. https://github.com/xubeining/Cve_report/blob/main/The%20router%20Tenda%20AC10%20v4%20V16.03.10.13%20of%20Shenzhen%20Jixiang%20Tenda%20Technology%20Co.%2C%20Ltd.%20has%20a%20heap%20overflow%20vulnerability.md", "creation_timestamp": "2025-05-12T18:26:28.000000Z"}, {"uuid": "ee9ef403-153c-4c82-86db-401f68d08f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44176", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15953", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-44176\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda FH451 V1.0.0.9 is vulnerable to Remote Code Execution in the formSafeEmailFilter function.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T17:11:06.168Z\n\ud83d\udd17 References:\n1. https://github.com/xubeining/Cve_report/blob/main/Notification%20of%20Remote%20Code%20Execution%20Vulnerability%20in%20Tenda%20FH451%20Router%20%28Version%20V1.0.0.9%29%20by%20Shenzhen%20Jixiang%20Tenda%20Technology.md", "creation_timestamp": "2025-05-12T18:26:26.000000Z"}, {"uuid": "76660780-88eb-474e-99ed-2c670da17ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44176", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15970", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-44176\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda FH451 V1.0.0.9 is vulnerable to Remote Code Execution in the formSafeEmailFilter function.\n\ud83d\udccf Published: 2025-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-12T17:11:06.168Z\n\ud83d\udd17 References:\n1. https://github.com/xubeining/Cve_report/blob/main/Notification%20of%20Remote%20Code%20Execution%20Vulnerability%20in%20Tenda%20FH451%20Router%20%28Version%20V1.0.0.9%29%20by%20Shenzhen%20Jixiang%20Tenda%20Technology.md", "creation_timestamp": "2025-05-12T18:26:52.000000Z"}, {"uuid": "146f608f-0700-439d-be9f-e501c1d2af4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44176", "type": "seen", "source": "https://t.me/cvedetector/25115", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-44176 - Tenda FH451 Unauthenticated Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-44176 \nPublished : May 12, 2025, 6:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : Tenda FH451 V1.0.0.9 is vulnerable to Remote Code Execution in the formSafeEmailFilter function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T22:48:42.000000Z"}, {"uuid": "591ae3b5-3dd6-465f-b440-99e84bdbc033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-44175", "type": "seen", "source": "https://t.me/cvedetector/25114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-44175 - \"Tenda AC10 Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-44175 \nPublished : May 12, 2025, 6:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : Tenda AC10 v4 V16.03.10.13 is vulnerable to Buffer Overflow in the GetParentControlInfo function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T22:48:38.000000Z"}]}