{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:43:59.454","vulnerabilities":[{"cve":{"id":"CVE-2025-52687","sourceIdentifier":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","published":"2025-07-16T07:15:21.683","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Successful exploitation of the vulnerability could allow an attacker with administrator credentials for the access point to inject malicious JavaScript into the payload of web traffics, potentially leading to session hijacking and denial-of-service (DoS)."},{"lang":"es","value":"La explotación exitosa de esta vulnerabilidad podría permitir a un atacante con credenciales de administrador para el punto de acceso inyectar JavaScript malicioso en el payload del tráfico web, lo que podría conducir al secuestro de sesiones y a la denegación de servicio (DoS)."}],"metrics":{"cvssMetricV31":[{"source":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":1.4}]},"weaknesses":[{"source":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"references":[{"url":"https://www.al-enterprise.com/-/media/assets/internet/documents/sa-n0150-omniaccess-stellar-multiple-vulnerabilities.pdf","source":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"},{"url":"https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-072/","source":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"}]}}]}