{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:56:04.743","vulnerabilities":[{"cve":{"id":"CVE-2025-32107","sourceIdentifier":"vultures@jpcert.or.jp","published":"2025-04-11T09:15:22.167","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"OS command injection vulnerability exists in Deco BE65 Pro firmware versions prior to \"Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123\". If this vulnerability is exploited, an arbitrary OS command may be executed by the user who can log in to the device."},{"lang":"es","value":" Existe una vulnerabilidad de inyección de comandos del sistema operativo en las versiones de firmware de Deco BE65 Pro anteriores a \"Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123\". Si se explota esta vulnerabilidad, el usuario que pueda iniciar sesión en el dispositivo podrá ejecutar un comando arbitrario del sistema operativo."}],"metrics":{"cvssMetricV30":[{"source":"vultures@jpcert.or.jp","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"vultures@jpcert.or.jp","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU94912671/","source":"vultures@jpcert.or.jp"},{"url":"https://www.tp-link.com/jp/support/download/deco-be65-pro/#Firmware","source":"vultures@jpcert.or.jp"}]}}]}