{"vulnerability": "cve-2025-2811", "sightings": [{"uuid": "01be9d35-76e1-4051-a837-adb806fdf172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2811", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnpn42kfzy24", "content": "", "creation_timestamp": "2025-04-26T11:29:37.178939Z"}, {"uuid": "13c56b88-acaf-4044-9769-4bbcf916a04a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2811", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnp7eozrama2", "content": "", "creation_timestamp": "2025-04-26T07:25:43.015148Z"}, {"uuid": "4a0884a1-82e2-408a-aca7-d9791483eaee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2811", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13573", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2811\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to inefficient regular expression complexity. It is recommended to upgrade the affected component.\n\ud83d\udccf Published: 2025-04-26T07:00:05.770Z\n\ud83d\udccf Modified: 2025-04-26T07:00:05.770Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306286\n2. https://vuldb.com/?ctiid.306286\n3. https://vuldb.com/?submit.524459\n4. https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Calling%20a%20special%20API%20that%20doesn't%20require%20login%20and%20passing%20in%20a%20special%20character%20parameter%20results%20in%20100%25%20CPU%20usage.md\n5. https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/", "creation_timestamp": "2025-04-26T07:08:12.000000Z"}, {"uuid": "e53fec6a-abb3-4c2b-b737-ead9c81e740a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2811", "type": "seen", "source": "https://t.me/cvedetector/23793", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2811 - \"GL.iNet Router Regular Expression Complexity Inefficient Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2811 \nPublished : April 26, 2025, 7:15 a.m. | 20\u00a0minutes ago \nDescription : A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to inefficient regular expression complexity. It is recommended to upgrade the affected component. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-26T10:13:46.000000Z"}]}