{"vulnerability": "CVE-2025-4579", "sightings": [{"uuid": "b92f67a2-144b-47f4-8972-65d6726f483f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45798\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A command execution vulnerability exists in the TOTOLINK A950RG V4.1.2cu.5204_B20210112. The vulnerability is located in the setNoticeCfg interface within the /lib/cste_modules/system.so library, specifically in the processing of the IpTo parameter.\n\ud83d\udccf Published: 2025-05-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T20:01:08.802Z\n\ud83d\udd17 References:\n1. https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A950RG/5024-setNoticeCFG-IpTo-command.md", "creation_timestamp": "2025-05-08T20:23:56.000000Z"}, {"uuid": "205c5313-0e16-4286-a55d-7abf893e6231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot2zwpsb32", "content": "", "creation_timestamp": "2025-05-08T21:15:08.889251Z"}, {"uuid": "e805f4e9-8abc-4773-911b-d97b289e3fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loot34hb6nh2", "content": "", "creation_timestamp": "2025-05-08T21:15:11.208325Z"}, {"uuid": "625c69a4-8197-4b5b-a184-92e7fb68d3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq33qdq2h", "content": "", "creation_timestamp": "2025-05-08T22:32:22.782199Z"}, {"uuid": "090cff8e-da6f-4252-bc6b-976bdaf74b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3gbva2r", "content": "", "creation_timestamp": "2025-05-08T22:32:24.717210Z"}, {"uuid": "ebf0fc6b-061e-4072-a130-38ed61927de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq3tyww2j", "content": "", "creation_timestamp": "2025-05-08T22:32:27.229893Z"}, {"uuid": "31d1e74f-3425-4cbb-8812-52c47fd6351e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp6jdx32gf2p", "content": "", "creation_timestamp": "2025-05-15T02:57:35.144083Z"}, {"uuid": "5f92a67e-6c38-4a70-8498-508b08bb5efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15614", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45797\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the NoticeUrl parameter in the setNoticeCfg interface of /lib/cste_modules/system.so.\n\ud83d\udccf Published: 2025-05-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T20:02:40.561Z\n\ud83d\udd17 References:\n1. https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A950RG/5024-setNoticeCFG-NoticURL-buffer.md", "creation_timestamp": "2025-05-08T20:23:54.000000Z"}, {"uuid": "9c06183f-7147-4c8c-b211-6d5f6bc3fd70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15618", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45790\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the priority parameter in the setMacQos interface of /lib/cste_modules/firewall.so.\n\ud83d\udccf Published: 2025-05-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T19:59:33.651Z\n\ud83d\udd17 References:\n1. https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A3100R-4/README.md", "creation_timestamp": "2025-05-08T20:24:00.000000Z"}, {"uuid": "19dfe7d4-2fea-49be-85d3-5617b1d52d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4579", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16437", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4579\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WP Content Security Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the blocked-uri and effective-directive  parameters in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-05-15T01:59:23.874Z\n\ud83d\udccf Modified: 2025-05-15T01:59:23.874Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/f3c4ba08-a9fa-439a-a887-b8c113f78e20?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L597\n3. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L612\n4. https://plugins.trac.wordpress.org/browser/wp-content-security-policy/tags/2.3/includes/WP_CSP.php#L659", "creation_timestamp": "2025-05-15T02:32:10.000000Z"}, {"uuid": "6000ccc6-ae2e-41f9-aa79-3965fddbf569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45797", "type": "seen", "source": "https://t.me/cvedetector/24864", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45797 - TOTOlink A950RG Buffer Overflow Vulnerability in NoticeUrl Parameter\", \n  \"Content\": \"CVE ID : CVE-2025-45797 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vulnerability arises from the improper input validation of the NoticeUrl parameter in the setNoticeCfg interface of /lib/cste_modules/system.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:58.000000Z"}, {"uuid": "f25b6cc1-2a17-4dec-abd4-84633d2d8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45798", "type": "seen", "source": "https://t.me/cvedetector/24865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45798 - TOTOLINK A950RG Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45798 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A command execution vulnerability exists in the TOTOLINK A950RG V4.1.2cu.5204_B20210112. The vulnerability is located in the setNoticeCfg interface within the /lib/cste_modules/system.so library, specifically in the processing of the IpTo parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:59.000000Z"}, {"uuid": "f925d5f6-6113-4a72-82b3-f6a6fac5b951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-45790", "type": "seen", "source": "https://t.me/cvedetector/24863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-45790 - TOTOLINK A3100R Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-45790 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : TOTOLINK A3100R V5.9c.1527 is vulnerable to Buffer Overflow via the priority parameter in the setMacQos interface of /lib/cste_modules/firewall.so. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:18:57.000000Z"}]}