{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:39:14.491","vulnerabilities":[{"cve":{"id":"CVE-2025-25527","sourceIdentifier":"cve@mitre.org","published":"2025-02-11T20:15:38.973","lastModified":"2025-08-13T14:07:57.597","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow vulnerability in Ruijie RG-NBR2600S Gateway 10.3(4b12) due to the lack of length verification, which is related to the configuration of source address NAT rules. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands."},{"lang":"es","value":"Vulnerabilidad de desbordamiento de búfer en Ruijie RG-NBR2600S Gateway 10.3(4b12) debido a la falta de verificación de longitud, que está relacionada con la configuración de las reglas NAT de la dirección de origen. Los atacantes que aprovechen esta vulnerabilidad con éxito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:L\/A:N","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.5,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ruijie:rg-nbr2600s_firmware:10.3\\(4b12\\):*:*:*:*:*:*:*","matchCriteriaId":"0B1BAF23-CE46-4578-8E32-BD56333B73EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ruijie:rg-nbr2600s:-:*:*:*:*:*:*:*","matchCriteriaId":"D46E7D1A-BEDC-43D6-B479-968D0D19FB84"}]}]}],"references":[{"url":"https:\/\/gist.github.com\/XiaoCurry\/354620285280aca98acba94a9c5fffb6","source":"cve@mitre.org","tags":["Broken Link"]}]}}]}