{"uuid": "244eeb1b-4304-4093-acc1-0041f943bbd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2189", "type": "seen", "source": "https://t.me/cvedetector/20084", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2189 - Tinxy Smart Devices PlainText Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2189 \nPublished : March 11, 2025, 12:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : This vulnerability exists in the Tinxy smart devices due to storage of credentials in plaintext within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the plaintext credentials stored on the vulnerable device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T15:57:16.000000Z"}