{"vulnerability": "CVE-2025-2770", "sightings": [{"uuid": "c9e44783-a350-411b-8e97-dfe6e4615392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-186/", "content": "", "creation_timestamp": "2025-03-25T04:00:00.000000Z"}, {"uuid": "5b546ddc-2b4e-4037-9204-c97013e3df78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27705", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114191036908054778", "content": "", "creation_timestamp": "2025-03-19T20:42:26.385562Z"}, {"uuid": "21ff7b4a-4d9e-4b18-95b5-9b8360458150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27704", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114191036908054778", "content": "", "creation_timestamp": "2025-03-19T20:42:26.457704Z"}, {"uuid": "35a21d86-5c3e-49db-83c0-3bd8cc613893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27704", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkr2mxz56q2x", "content": "", "creation_timestamp": "2025-03-19T20:48:49.071946Z"}, {"uuid": "48859ca6-b4ad-4c79-a409-678349372822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27705", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkr2my4j5k2k", "content": "", "creation_timestamp": "2025-03-19T20:48:49.665522Z"}, {"uuid": "9bb4f285-f456-436b-bfcf-e5011bb1131f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27701", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65vkwwxm22", "content": "", "creation_timestamp": "2025-05-27T17:00:36.433825Z"}, {"uuid": "f094e5d4-00b4-4e41-a28e-85009d0844dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27700", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lq65w2v5id22", "content": "", "creation_timestamp": "2025-05-27T17:01:18.280277Z"}, {"uuid": "50603972-abab-41c5-83fe-8a3a3de41d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27709", "type": "seen", "source": "Telegram/bTJ9s_6Dm5c98HBw_nHhlVxkUI4b7kIVaieHQvre00jyC9A", "content": "", "creation_timestamp": "2025-06-09T12:01:36.000000Z"}, {"uuid": "54bfc12d-d32b-4def-833d-65b110fd121f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388579201738740", "content": "", "creation_timestamp": "2025-04-23T18:00:01.899357Z"}, {"uuid": "ff4942cb-9c14-4a13-8466-56b7099d3753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnj4fbuzoy2v", "content": "", "creation_timestamp": "2025-04-23T21:14:36.992832Z"}, {"uuid": "236effc4-0de6-400f-9c3f-0232a6d690f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27704", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8121", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27704\n\ud83d\udd25 CVSS Score: 5.5 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: There is a cross-site scripting vulnerability in the Secure\nAccess administrative console of Absolute Secure Access prior to version 13.53.\nAttackers with system administrator permissions can interfere with another\nsystem administrator\u2019s use of the management console when the second\nadministrator logs in.  Attack complexity is high, attack requirements are\npresent, privileges required are none, user interaction is required. The impact\nto confidentiality is low, the impact to availability is none, and the impact\nto system integrity is none.\n\ud83d\udccf Published: 2025-03-19T19:08:26.262Z\n\ud83d\udccf Modified: 2025-03-19T19:12:58.341Z\n\ud83d\udd17 References:\n1. https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1353/", "creation_timestamp": "2025-03-19T19:18:14.000000Z"}, {"uuid": "6516ca4a-7199-49b4-bd74-1d8a35c28a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27705", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8134", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27705\n\ud83d\udd25 CVSS Score: 5.5 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: There is a cross-site scripting vulnerability in the Secure\nAccess administrative console of Absolute Secure Access prior to version 13.53.\nAttackers with system administrator permissions can interfere with another\nsystem administrator\u2019s use of the management console when the second\nadministrator logs in.  Attack complexity is high, attack requirements are\npresent, privileges required are none, user interaction is required. The impact\nto confidentiality is low, the impact to availability is none, and the impact\nto system integrity is none.\n\ud83d\udccf Published: 2025-03-19T19:15:08.265Z\n\ud83d\udccf Modified: 2025-03-19T20:06:42.594Z\n\ud83d\udd17 References:\n1. https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1353/", "creation_timestamp": "2025-03-19T20:18:00.000000Z"}, {"uuid": "cb5670ed-be18-4606-9538-17d6ed547b72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-27709", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114653436896870669", "content": "", "creation_timestamp": "2025-06-09T12:36:49.666647Z"}, {"uuid": "c8c988b9-05ed-4cc3-a6bc-eb3cc3e9174a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27700", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17656", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27700\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a possible bypass of carrier restrictions due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-05-27T15:41:52.015Z\n\ud83d\udccf Modified: 2025-05-27T15:41:52.015Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:13.000000Z"}, {"uuid": "184dac2c-bd44-460b-ab7f-1b31cb2dfabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27701", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17654", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27701\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the function process_crypto_cmd, the values of ptrs[i] can be potentially equal to NULL which is valid value after calling slice_map_array(). Later this values will be derefenced without prior NULL check, which can lead to local Temporary DoS or OOB Read, leading to information disclosure.\n\ud83d\udccf Published: 2025-05-27T15:42:11.318Z\n\ud83d\udccf Modified: 2025-05-27T15:42:11.318Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/pixel/2025-05-01", "creation_timestamp": "2025-05-27T15:49:11.000000Z"}, {"uuid": "565ccd38-9a1f-45ea-bae8-16f871425989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2770", "type": "seen", "source": "https://t.me/cvedetector/23604", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2770 - BEC Technologies Router Cleartext Password Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2770 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : BEC Technologies Multiple Routers Cleartext Password Storage Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is required to exploit this vulnerability.  \n  \nThe specific flaw exists within the web-based user interface. The issue results from storing credentials in a recoverable format. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-25986. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:23.000000Z"}, {"uuid": "d7088553-7e38-4907-8588-300db1879461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27705", "type": "seen", "source": "https://t.me/cvedetector/20687", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27705 - Absolute Secure Access Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27705 \nPublished : March 19, 2025, 8:15 p.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : There is a cross-site scripting vulnerability in the Secure  \nAccess administrative console of Absolute Secure Access prior to version 13.53.  \nAttackers with system administrator permissions can interfere with another  \nsystem administrator\u2019s use of the management console when the second  \nadministrator logs in.  Attack complexity is high, attack requirements are  \npresent, privileges required are none, user interaction is required. The impact  \nto confidentiality is low, the impact to availability is none, and the impact  \nto system integrity is none. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T23:00:41.000000Z"}]}