"-Synchronized-Data."

This commit is contained in:
CVE Team 2025-06-02 10:00:38 +00:00
parent 967f5ee3d2
commit 93edc6e2f6
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
7 changed files with 612 additions and 8 deletions

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-49125",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,17 +1,274 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-5438",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. Affected by this vulnerability is the function WPS of the file /goform/WPS. The manipulation of the argument PIN leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "In Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 wurde eine kritische Schwachstelle ausgemacht. Betroffen ist die Funktion WPS der Datei /goform/WPS. Mittels dem Manipulieren des Arguments PIN mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection",
"cweId": "CWE-77"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linksys",
"product": {
"product_data": [
{
"product_name": "RE6500",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE6250",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE6300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE6350",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE7000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE9000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.310777",
"refsource": "MISC",
"name": "https://vuldb.com/?id.310777"
},
{
"url": "https://vuldb.com/?ctiid.310777",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.310777"
},
{
"url": "https://vuldb.com/?submit.584360",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.584360"
},
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_1/1.md",
"refsource": "MISC",
"name": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_1/1.md"
},
{
"url": "https://www.linksys.com/",
"refsource": "MISC",
"name": "https://www.linksys.com/"
}
]
},
"credits": [
{
"lang": "en",
"value": "pjqwudi (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,274 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-5439",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been rated as critical. Affected by this issue is the function verifyFacebookLike of the file /goform/verifyFacebookLike. The manipulation of the argument uid/accessToken leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001 ausgemacht. Betroffen davon ist die Funktion verifyFacebookLike der Datei /goform/verifyFacebookLike. Mittels Manipulieren des Arguments uid/accessToken mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "OS Command Injection",
"cweId": "CWE-78"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Command Injection",
"cweId": "CWE-77"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linksys",
"product": {
"product_data": [
{
"product_name": "RE6500",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE6250",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE6300",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE6350",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE7000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
},
{
"product_name": "RE9000",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0.013.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.001"
},
{
"version_affected": "=",
"version_value": "1.0.04.002"
},
{
"version_affected": "=",
"version_value": "1.1.05.003"
},
{
"version_affected": "=",
"version_value": "1.2.07.001"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.310778",
"refsource": "MISC",
"name": "https://vuldb.com/?id.310778"
},
{
"url": "https://vuldb.com/?ctiid.310778",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.310778"
},
{
"url": "https://vuldb.com/?submit.584361",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.584361"
},
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_2/2.md",
"refsource": "MISC",
"name": "https://github.com/wudipjq/my_vuln/blob/main/Linksys/vuln_2/2.md"
},
{
"url": "https://www.linksys.com/",
"refsource": "MISC",
"name": "https://www.linksys.com/"
}
]
},
"credits": [
{
"lang": "en",
"value": "pjqwudi (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-5457",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-5458",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-5459",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2025-5460",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}