{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T04:44:19.535","vulnerabilities":[{"cve":{"id":"CVE-2025-29534","sourceIdentifier":"cve@mitre.org","published":"2025-07-28T20:17:44.480","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An authenticated remote code execution vulnerability in PowerStick Wave Dual-Band Wifi Extender V1.0 allows an attacker with valid credentials to execute arbitrary commands with root privileges. The issue stems from insufficient sanitization of user-supplied input in the /cgi-bin/cgi_vista.cgi executable, which is passed to a system-level function call."},{"lang":"es","value":"Una vulnerabilidad de ejecución remota de código autenticado en PowerStick Wave Dual-Band Wifi Extender V1.0 permite a un atacante con credenciales válidas ejecutar comandos arbitrarios con privilegios de root. El problema se debe a una depuración insuficiente de la entrada proporcionada por el usuario en el ejecutable /cgi-bin/cgi_vista.cgi, que se pasa a una llamada de función a nivel de sistema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"http://wave.com","source":"cve@mitre.org"},{"url":"https://gist.github.com/EmptyButter/19b2c626f4589d1f9d4478632205a9eb","source":"cve@mitre.org"}]}}]}