{"vulnerability": "CVE-2025-20620", "sightings": [{"uuid": "b38c7285-8a91-4d2c-96a4-ed2475e3ea6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20620", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfozfspmaj2d", "content": "", "creation_timestamp": "2025-01-14T10:15:36.822329Z"}, {"uuid": "1543a9b2-ed2d-456e-8080-b322075b03cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20620", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20620\n\ud83d\udd39 Description: SQL Injection vulnerability exists in STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may obtain the administrative password of the web management page.\n\ud83d\udccf Published: 2025-01-14T09:34:47.643Z\n\ud83d\udccf Modified: 2025-01-14T09:34:47.643Z\n\ud83d\udd17 References:\n1. https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/\n2. https://jvn.jp/en/vu/JVNVU99653331/", "creation_timestamp": "2025-01-14T10:21:52.000000Z"}, {"uuid": "1095c08f-291e-4987-b33b-715f845ef555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20620", "type": "seen", "source": "https://t.me/cvedetector/15243", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20620 - Y'S Stealthone SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-20620 \nPublished : Jan. 14, 2025, 10:15 a.m. | 39\u00a0minutes ago \nDescription : SQL Injection vulnerability exists in STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may obtain the administrative password of the web management page. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T12:19:00.000000Z"}, {"uuid": "ae11844d-b588-4851-b422-67187c4f42ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20620", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826039836248977", "content": "", "creation_timestamp": "2025-01-14T09:38:52.313188Z"}, {"uuid": "8344742e-3d13-402c-97a4-8ae4862dd3cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-20620", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37oe2yc2h", "content": "", "creation_timestamp": "2025-01-14T10:47:58.934815Z"}]}