{"vulnerability": "CVE-2025-46632", "sightings": [{"uuid": "c7984002-e355-4a1e-9449-c5ce1c510dfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46632", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo5cppngbg2j", "content": "", "creation_timestamp": "2025-05-01T22:01:07.399090Z"}, {"uuid": "7c16741f-7375-4f71-95ac-f6bd96eb71c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46632", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14492", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46632\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server.\n\ud83d\udccf Published: 2025-05-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-02T15:04:06.366Z\n\ud83d\udd17 References:\n1. https://www.tendacn.com/us/default.html\n2. https://blog.uturn.dev/#/writeups/iot-village/tenda-rx2pro/README?id=cve-2025-46632-static-iv-use-in-httpd", "creation_timestamp": "2025-05-02T15:16:56.000000Z"}, {"uuid": "f72f57aa-bfe6-42c9-b125-c4f7d0e047d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46632", "type": "seen", "source": "https://t.me/cvedetector/24264", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46632 - Tenda RX2 Pro Cryptographic IV Reuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46632 \nPublished : May 1, 2025, 8:15 p.m. | 20\u00a0minutes ago \nDescription : Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.30.14 may allow an attacker to discern information about or more easily decrypt encrypted messages between client and server. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T23:12:30.000000Z"}]}