{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T19:57:01.444","vulnerabilities":[{"cve":{"id":"CVE-2025-26062","sourceIdentifier":"cve@mitre.org","published":"2025-07-31T19:15:28.610","lastModified":"2025-11-03T20:18:00.380","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An access control issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to access the router's settings file and obtain potentially sensitive information from the current settings."},{"lang":"es","value":"Un problema de control de acceso en Intelbras RX1500 v2.2.9 y RX3000 v1.0.11 permite a atacantes no autenticados acceder al archivo de configuración del enrutador y obtener información potencialmente confidencial de la configuración actual."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelbras:rx_1500_firmware:2.2.9:*:*:*:*:*:*:*","matchCriteriaId":"ECB8C40B-084E-4858-AA0C-966E3D86B100"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelbras:rx_1500:-:*:*:*:*:*:*:*","matchCriteriaId":"4B3E00F0-4F8F-4A2F-A553-74B0C682EF3C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelbras:rx_3000_firmware:1.0.11:*:*:*:*:*:*:*","matchCriteriaId":"6E2495F3-D96B-475D-BC50-F75324036A66"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelbras:rx_3000:-:*:*:*:*:*:*:*","matchCriteriaId":"A807025F-C981-4DED-9F75-A2F02E63416E"}]}]}],"references":[{"url":"https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX1500.html","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://manuais.intelbras.com.br/manual-linha-rx/ChangeLogRX3000.html","source":"cve@mitre.org","tags":["Release Notes"]},{"url":"https://seclists.org/fulldisclosure/2025/Jul/14","source":"cve@mitre.org","tags":["Exploit","Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2025/Jul/14","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2025/Jul/26","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}