{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T02:11:02.010","vulnerabilities":[{"cve":{"id":"CVE-2025-4635","sourceIdentifier":"cve_disclosure@tech.gov.sg","published":"2025-05-30T09:15:25.677","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A malicious user with administrative privileges in the web portal would be able to manipulate the Diagnostics module to obtain remote code execution on the local device as a low privileged user."},{"lang":"es","value":"Un usuario malintencionado con privilegios administrativos en el portal web podría manipular el módulo de Diagnóstico para obtener la ejecución remota de código en el dispositivo local como un usuario con pocos privilegios."}],"metrics":{"cvssMetricV31":[{"source":"cve_disclosure@tech.gov.sg","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.3,"impactScore":3.7}]},"weaknesses":[{"source":"cve_disclosure@tech.gov.sg","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"references":[{"url":"https://jct-aq.com/products/airpointer2d/","source":"cve_disclosure@tech.gov.sg"}]}}]}