{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T19:06:52.525","vulnerabilities":[{"cve":{"id":"CVE-2025-2772","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-04-23T17:16:55.290","lastModified":"2025-08-21T00:37:29.590","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"BEC Technologies Multiple Routers Insufficiently Protected Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within /cgi-bin/tools_usermanage.asp. The issue results from transmitting a list of users and their credentials to be handled on the client side. An attacker can leverage this vulnerability to disclose transported credentials, leading to further compromise. Was ZDI-CAN-25895."},{"lang":"es","value":"Vulnerabilidad de divulgación de información de credenciales insuficientemente protegidas en múltiples enrutadores de BEC Technologies. Esta vulnerabilidad permite a atacantes adyacentes a la red divulgar información confidencial sobre las instalaciones afectadas de enrutadores de BEC Technologies. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en /cgi-bin/tools_usermanage.asp. El problema se debe a la transmisión de una lista de usuarios y sus credenciales para su gestión en el lado del cliente. Un atacante puede aprovechar esta vulnerabilidad para divulgar las credenciales transportadas, lo que conlleva una mayor vulnerabilidad. Anteriormente, se denominó ZDI-CAN-25895."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bectechnologies:router_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"0B67386D-1A8A-462E-B088-16742C92DA66"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-185/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}