{"uuid": "9f365641-5235-4b4b-b4f5-a1ef04f25df0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1204", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5333", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1204\n\ud83d\udd25 CVSS Score: 7.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The \"update\" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.\n\ud83d\udccf Published: 2025-02-25T17:00:16.133Z\n\ud83d\udccf Modified: 2025-02-25T17:00:16.133Z\n\ud83d\udd17 References:\n1. https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated?ref=vault33.org\n2. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01", "creation_timestamp": "2025-02-25T17:23:17.000000Z"}