{"uuid": "45ac3e2e-c1fe-4e77-af71-776309af91e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47418", "type": "seen", "source": "https://t.me/cvedetector/24649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47418 - Crestron Automate VX Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-47418 \nPublished : May 6, 2025, 9:16 p.m. | 59\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse.  \n  \nThere is no visible indication when the system is recording and recording can be enabled remotely via a network API.   \nThis issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T00:31:24.000000Z"}