{"uuid": "318edefb-b4b8-46f7-8336-982e280dda94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2346", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7721", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2346\n\ud83d\udd25 CVSS Score: 6.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308 and classified as problematic. This vulnerability affects unknown code of the component Domain Handler. The manipulation of the argument Domain Name leads to origin validation error. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult.\n\ud83d\udccf Published: 2025-03-16T20:00:11.895Z\n\ud83d\udccf Modified: 2025-03-16T20:00:11.895Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299812\n2. https://vuldb.com/?ctiid.299812\n3. https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-6-public-domain-used-for-internal-domain-name", "creation_timestamp": "2025-03-16T20:49:09.000000Z"}