{"uuid": "c67861dd-3a3a-48f8-8792-eed09a05e4c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-47417", "type": "seen", "source": "https://t.me/cvedetector/24655", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47417 - Crestron Automate VX Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-47417 \nPublished : May 6, 2025, 8:15 p.m. | 2\u00a0hours ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse.  \n  \n  \n  \nWhen Enable Debug Images in Crestron Automate VX is active, snapshots of the captured video or portions thereof are stored locally on the system, and there is no visible indication that this is being done.  \n  \n  \nThis issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T00:31:32.000000Z"}