{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T08:59:38.592","vulnerabilities":[{"cve":{"id":"CVE-2025-50404","sourceIdentifier":"cve@mitre.org","published":"2025-07-01T15:15:26.043","lastModified":"2025-08-20T17:05:58.403","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Intelbras RX1500 Router v2.2.17 and before is vulnerable to Integer Overflow. The websReadEvent function incorrectly uses the int type when processing the \"command\" field of the http header, causing the array to cross the boundary and overwrite other fields in the array."},{"lang":"es","value":"Intelbras RX1500 Router v2.2.17 y versiones anteriores es vulnerable a desbordamiento de enteros. La función websReadEvent utiliza incorrectamente el tipo int al procesar el campo \"command\" del encabezado http, lo que provoca que la matriz cruce el límite y sobrescriba otros campos de la matriz."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-190"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelbras:rx_1500_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.17","matchCriteriaId":"D9BDD8A0-7DDA-415A-8291-15920FAAA541"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelbras:rx_1500:-:*:*:*:*:*:*:*","matchCriteriaId":"4B3E00F0-4F8F-4A2F-A553-74B0C682EF3C"}]}]}],"references":[{"url":"https://github.com/feiwuxingxie/cve/blob/main/Intelbras/vul01/01.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.intelbras.com/en","source":"cve@mitre.org","tags":["Product"]}]}}]}