{"vulnerability": "cve-2025-3674", "sightings": [{"uuid": "03eb6b48-c83b-4648-9281-06bd1ca80852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3674", "type": "seen", "source": "https://t.me/cvedetector/23064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3674 - TOTOLINK A3700R Remote Improper Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3674 \nPublished : April 16, 2025, 7:15 a.m. | 2\u00a0hours, 12\u00a0minutes ago \nDescription : A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T11:51:02.000000Z"}, {"uuid": "ae1ba2da-f427-4311-83d6-a8470533bead", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36745", "type": "seen", "source": "https://gist.github.com/Darkcrai86/88c704c23fac52fefc5b106e50aeda6d", "content": "", "creation_timestamp": "2025-12-12T16:10:25.000000Z"}, {"uuid": "37de497c-e661-4fba-8677-0a5923cb9c6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36743", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115707654519020548", "content": "", "creation_timestamp": "2025-12-12T16:58:14.080516Z"}, {"uuid": "5a1e7963-73e8-4feb-a82d-c9da22d2945b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36744", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115707654519020548", "content": "", "creation_timestamp": "2025-12-12T16:58:14.153023Z"}, {"uuid": "404375bf-94bd-477e-9ae7-9356c2fbaf76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36745", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115707654519020548", "content": "", "creation_timestamp": "2025-12-12T16:58:14.230535Z"}, {"uuid": "1b6cb0f0-3c3c-469b-ba07-fe950fe60c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36746", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115707654519020548", "content": "", "creation_timestamp": "2025-12-12T16:58:14.304722Z"}, {"uuid": "7d946a17-db41-4620-9172-a6794ded835a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36743", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7skuxrlcm2u", "content": "", "creation_timestamp": "2025-12-12T17:01:20.479247Z"}, {"uuid": "179f192c-22e8-45ee-ab0b-08bbca407d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36745", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7sl5wag6l2q", "content": "", "creation_timestamp": "2025-12-12T17:06:21.010181Z"}, {"uuid": "d2aead89-26f0-486e-807c-543603d96b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36745", "type": "seen", "source": "https://gist.github.com/Darkcrai86/cdbbb607245caddd0f7cbce31b920410", "content": "", "creation_timestamp": "2025-12-12T17:26:02.000000Z"}, {"uuid": "0231e282-ad74-44ca-9d0d-040b988714e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-36747", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115711575109311329", "content": "", "creation_timestamp": "2025-12-13T09:35:18.364617Z"}, {"uuid": "badbdee8-4ecc-4b72-95b7-28d945a8bc39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-36747", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7ucgdm4j22a", "content": "", "creation_timestamp": "2025-12-13T09:35:20.317623Z"}, {"uuid": "be9b163a-3ead-44dc-840c-e61437981b59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3674", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmwfuqlor22q", "content": "", "creation_timestamp": "2025-04-16T10:43:42.271829Z"}, {"uuid": "a340a1a7-2577-4bad-9edf-8c0c9f49bd70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36748", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7uisojopr2c", "content": "", "creation_timestamp": "2025-12-13T11:29:35.798155Z"}, {"uuid": "2d76b6db-eb66-44ed-8fba-92cffa7a0e63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-36747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7ujwjn7ds2c", "content": "", "creation_timestamp": "2025-12-13T11:49:38.493437Z"}, {"uuid": "12cfb58b-b040-4388-971d-5cbc348687db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3674", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3674\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. It has been declared as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-16T07:00:11.827Z\n\ud83d\udccf Modified: 2025-04-16T07:00:11.827Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.304963\n2. https://vuldb.com/?ctiid.304963\n3. https://vuldb.com/?submit.551302\n4. https://lavender-bicycle-a5a.notion.site/TOTOLINK-A3700R-setUrlFilterRules-1cb53a41781f808f9547da7748580914?pvs=4\n5. https://www.totolink.net/", "creation_timestamp": "2025-04-16T07:55:34.000000Z"}]}