{"vulnerability": "CVE-2025-3012", "sightings": [{"uuid": "af16e149-9c2e-4abb-be0d-4868b7c83c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30123", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8404", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30123\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered on ROADCAM X3 devices. The mobile app APK (Viidure) contains hardcoded FTP credentials for the FTPX user account, enabling attackers to gain unauthorized access and extract sensitive recorded footage from the device.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T17:56:19.116Z\n\ud83d\udd17 References:\n1. https://roadcam.my/pages/install-x3\n2. https://github.com/geo-chen/RoadCam", "creation_timestamp": "2025-03-21T18:20:08.000000Z"}, {"uuid": "92c8b1f5-bfd5-4e0e-aedb-a55619e8185c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30123", "type": "seen", "source": "https://t.me/cvedetector/20576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30123 - Roadcam X3 Hardcoded FTP Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30123 \nPublished : March 18, 2025, 3:16 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : An issue was discovered on ROADCAM X3 devices. The mobile app APK (Viidure) contains hardcoded FTP credentials for the FTPX user account, enabling attackers to gain unauthorized access and extract sensitive recorded footage from the device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:10.000000Z"}, {"uuid": "2dd2cd74-e1fe-4bcb-9dd7-d6b61f96dd82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30122", "type": "seen", "source": "https://t.me/cvedetector/20575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30122 - Roadcam X3 Default Credential Vulnerability (Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2025-30122 \nPublished : March 18, 2025, 3:16 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:09.000000Z"}, {"uuid": "d49b3b96-c58a-447b-9b65-04acae053fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30122", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkobie4c4v26", "content": "", "creation_timestamp": "2025-03-18T18:13:37.945871Z"}, {"uuid": "4d3ae95e-310f-43d5-adf0-142730c172ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30123", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkobiedw4j2m", "content": "", "creation_timestamp": "2025-03-18T18:13:39.212431Z"}, {"uuid": "4a0c914b-93cb-4ce3-8529-e250cdab4d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30127", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lvqyn7c5go2s", "content": "", "creation_timestamp": "2025-08-06T19:50:16.681909Z"}, {"uuid": "606b881d-956c-424b-9cc8-5e3adc343048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-30127", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lvs2ruvgbh2b", "content": "", "creation_timestamp": "2025-08-07T06:01:21.856094Z"}, {"uuid": "e2733df5-c3eb-4c09-8413-970faa693d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30122", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8338", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30122\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:59:34.498Z\n\ud83d\udd17 References:\n1. https://roadcam.my/pages/install-x3\n2. https://github.com/geo-chen/RoadCam", "creation_timestamp": "2025-03-21T14:19:09.000000Z"}, {"uuid": "5b7e5126-76e8-461b-b255-5152e1b0c081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30126", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luzwa74hu42w", "content": "", "creation_timestamp": "2025-07-28T15:35:58.651119Z"}]}