{"vulnerability": "CVE-2025-2598", "sightings": [{"uuid": "ea8f7b7f-613d-489f-bef2-9e04f6a27417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/60601", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aTesting if AWS exploit CVE-2025-2598 still works\nURL\uff1ahttps://github.com/Catnip-Express-Maxim/AWSTESTEXPLOIT\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-23T19:20:55.000000Z"}, {"uuid": "a13c37db-0b90-40c2-b5bc-4abb32834b4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25988", "type": "seen", "source": "https://t.me/cvedetector/18126", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25988 - Hooskcms Cross-Site Scripting Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-25988 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : Cross Site Scripting vulnerability in hooskcms v.1.8 allows a remote attacker to cause a denial of service via the custom Link title parameter and the Title parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:01.000000Z"}, {"uuid": "71dea434-6efe-4f93-acf4-0ad136b6f82d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "seen", "source": "https://t.me/cvedetector/20818", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2598 - AWS CDK CLI AWS Credentials Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2598 \nPublished : March 21, 2025, 3:15 p.m. | 1\u00a0hour, 28\u00a0minutes ago \nDescription : When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with a credential plugin which returns an expiration property with the retrieved AWS credentials, the credentials are printed to the console output. To mitigate this issue, users should upgrade to version 2.178.2 or later and ensure any forked or derivative code is patched to incorporate the new fixes. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T18:29:04.000000Z"}, {"uuid": "6ff45e59-0082-4ccc-b52e-5f23fcf238ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25983", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln4hrg4wbm2g", "content": "", "creation_timestamp": "2025-04-18T20:33:41.020897Z"}, {"uuid": "4dd4ff72-3c4c-411f-8e7c-b29480a1fc7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25985", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln4hrgkrn42g", "content": "", "creation_timestamp": "2025-04-18T20:33:43.672020Z"}, {"uuid": "cca8eb2c-5e69-4b86-a17b-772b9c89ef35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25983", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln4rylbhy372", "content": "", "creation_timestamp": "2025-04-18T23:36:38.602685Z"}, {"uuid": "3c3ef159-4280-4de8-8a2b-9a8d14b10103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25988", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4498", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25988\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: Cross Site Scripting vulnerability in hooskcms v.1.8 allows a remote attacker to cause a denial of service via the custom Link title parameter and the Title parameter.\n\ud83d\udccf Published: 2025-02-14T18:30:52Z\n\ud83d\udccf Modified: 2025-02-14T21:31:05Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-25988\n2. https://github.com/havok89/Hoosk/issues/67", "creation_timestamp": "2025-02-14T22:10:53.000000Z"}, {"uuid": "7f4cdd33-ba31-4daa-bdd1-54bd0712b100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25985", "type": "seen", "source": "https://t.me/cvedetector/23344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25985 - Macro-video Technologies Co.,Ltd V380E6_C1 IP Camera Physical Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25985 \nPublished : April 18, 2025, 8:15 p.m. | 29\u00a0minutes ago \nDescription : An issue in Macro-video Technologies Co.,Ltd V380E6_C1 IP camera (Hw_HsAKPIQp_WF_XHR) 1020302 allows a physically proximate attacker to execute arbitrary code via the /mnt/mtd/mvconf/wifi.ini and /mnt/mtd/mvconf/user_info.ini components. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T23:16:07.000000Z"}, {"uuid": "1e6815d8-8c7b-46c0-82c3-d167fb033a07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25983", "type": "seen", "source": "https://t.me/cvedetector/23343", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25983 - Macro-video Technologies Co.,Ltd V380 Pro Android Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-25983 \nPublished : April 18, 2025, 8:15 p.m. | 29\u00a0minutes ago \nDescription : An issue in Macro-video Technologies Co.,Ltd V380 Pro android application 2.1.44 and V380 Pro android application 2.1.64 allows an attacker to obtain sensitive information via the QE code based sharing component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T23:16:06.000000Z"}, {"uuid": "6f388057-1838-4523-a95e-94ccc2a2cb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25984", "type": "seen", "source": "https://t.me/cvedetector/23342", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25984 - Macro-video Technologies Co.,Ltd V380E6_C1 IP Camera UART Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25984 \nPublished : April 18, 2025, 8:15 p.m. | 29\u00a0minutes ago \nDescription : An issue in Macro-video Technologies Co.,Ltd V380E6_C1 IP camera (Hw_HsAKPIQp_WF_XHR) 1020302 allows a physically proximate attacker to execute arbitrary code via UART component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-18T23:16:05.000000Z"}, {"uuid": "dc70222d-f4d4-4257-95ca-15ef6f0a5749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25984", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ln4hrfloto2r", "content": "", "creation_timestamp": "2025-04-18T20:33:37.977165Z"}, {"uuid": "b1aecf02-a4bd-435f-8265-884416d3969b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25983", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:56.000000Z"}, {"uuid": "90528e01-9dd2-49c9-8f8c-67ea19d438ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25985", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-09T13:26:56.000000Z"}, {"uuid": "b1e7dd55-697d-4b77-86c5-f4aa637bd63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "published-proof-of-concept", "source": "Telegram/CNCo7u9pxW3UDCEza_6pwX43cNExCuNI5ZKP87l7tNL-Bg4", "content": "", "creation_timestamp": "2025-11-24T03:00:06.000000Z"}, {"uuid": "5d7f5130-4ee1-413b-8372-053373c7b5f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8382", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2598\n\ud83d\udd25 CVSS Score: 5.7 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with a credential plugin which returns an expiration property with the retrieved AWS credentials, the credentials are printed to the console output. To mitigate this issue, users should upgrade to version 2.178.2 or later and ensure any forked or derivative code is patched to incorporate the new fixes.\n\ud83d\udccf Published: 2025-03-21T14:14:29.040Z\n\ud83d\udccf Modified: 2025-03-21T16:27:39.401Z\n\ud83d\udd17 References:\n1. https://aws.amazon.com/security/security-bulletins/AWS-2025-005/\n2. https://github.com/aws/aws-cdk/security/advisories/GHSA-v63m-x9r9-8gqp", "creation_timestamp": "2025-03-21T17:19:21.000000Z"}, {"uuid": "5fbafba8-2e7b-4913-a164-60854c31ac41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25984", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12545", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25984\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Macro-video Technologies Co.,Ltd V380E6_C1 IP camera (Hw_HsAKPIQp_WF_XHR) 1020302 allows a physically proximate attacker to execute arbitrary code via UART component.\n\ud83d\udccf Published: 2025-04-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T20:31:36.279Z\n\ud83d\udd17 References:\n1. https://github.com/vladko312/Research_v380_IP_camera\n2. https://github.com/vladko312/Research_v380_IP_camera/blob/main/CVE-2025-25984.md", "creation_timestamp": "2025-04-18T20:59:27.000000Z"}, {"uuid": "f9cb8edd-1258-4e08-96f7-717fdfab281c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25983", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12540", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25983\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Macro-video Technologies Co.,Ltd V380 Pro android application 2.1.44 and V380 Pro android application 2.1.64 allows an attacker to obtain sensitive information via the QE code based sharing component.\n\ud83d\udccf Published: 2025-04-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T20:37:54.776Z\n\ud83d\udd17 References:\n1. https://github.com/vladko312/Research_v380_IP_camera\n2. https://github.com/vladko312/Research_v380_IP_camera/blob/main/CVE-2025-25983.md", "creation_timestamp": "2025-04-18T20:59:23.000000Z"}, {"uuid": "77007e61-b215-4849-b4e8-24be96a334a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25985", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12546", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25985\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in Macro-video Technologies Co.,Ltd V380E6_C1 IP camera (Hw_HsAKPIQp_WF_XHR) 1020302 allows a physically proximate attacker to execute arbitrary code via the /mnt/mtd/mvconf/wifi.ini and /mnt/mtd/mvconf/user_info.ini components.\n\ud83d\udccf Published: 2025-04-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T20:26:40.767Z\n\ud83d\udd17 References:\n1. https://github.com/vladko312/Research_v380_IP_camera\n2. https://github.com/vladko312/Research_v380_IP_camera/blob/main/CVE-2025-25985.md", "creation_timestamp": "2025-04-18T20:59:28.000000Z"}, {"uuid": "10dad761-335a-469e-8156-deb4714e4225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114200918918881971", "content": "", "creation_timestamp": "2025-03-21T14:35:33.140870Z"}, {"uuid": "8e6d39a0-4b68-4281-afce-8b152f97e119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25988", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdwos4i24", "content": "", "creation_timestamp": "2025-02-14T17:15:56.106602Z"}, {"uuid": "6ece613b-3155-482a-9a61-6ff31adf3eb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25988", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5ud7fpwz2z", "content": "", "creation_timestamp": "2025-02-14T18:45:04.228031Z"}, {"uuid": "040bdcc0-d5ed-4ece-b89e-e80ae395fa96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25983", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:39.000000Z"}, {"uuid": "7af1953b-1436-4fa9-9399-8d1e2f34d5e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25985", "type": "seen", "source": "MISP/abd2a650-703d-4a2f-9f73-3051c1672e27", "content": "", "creation_timestamp": "2025-08-11T18:47:39.000000Z"}, {"uuid": "28cd4332-5850-4dd2-9d9f-8e41d86730a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "14b7c304-cfa6-4a4b-970f-b11704f0f281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25987", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "5ae9d11e-9d68-48a0-9faa-cc3f11d6d034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2598", "type": "published-proof-of-concept", "source": "Telegram/cQbTgpKMUqE7r50TMi-Jo6XMKFA-M4NuOONOoKLBjTRKKPs", "content": "", "creation_timestamp": "2025-11-25T03:00:13.000000Z"}]}