{"vulnerability": "CVE-2025-4058", "sightings": [{"uuid": "b560ab7e-6ddc-4c23-93f2-0458b3b3ab75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40584", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-18", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "c3b07dc5-2204-4e69-a016-4da4f75889c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40587", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3meit2bxzct27", "content": "", "creation_timestamp": "2026-02-10T11:06:49.943299Z"}, {"uuid": "9bf47da9-dd50-4fc4-a613-5b4f8a28db46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40580", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16095", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40580\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions). Affected devices are vulnerable to a stack-based buffer overflow.\nThis could allow a non-privileged local attacker to execute arbitrary code on the device or to cause a denial of service condition.\n\ud83d\udccf Published: 2025-05-13T09:39:07.185Z\n\ud83d\udccf Modified: 2025-05-13T09:39:07.185Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-327438.html", "creation_timestamp": "2025-05-13T10:30:18.000000Z"}, {"uuid": "5c9b445f-5450-4729-94e0-267a3a2fc055", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40585", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17900", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40585\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L)\n\ud83d\udd39 Description: A vulnerability has been identified in Energy Services (All versions with G5DFR). Affected solutions using G5DFR contain default credentials. This could allow an attacker to gain control of G5DFR component and tamper with outputs from the device.\n\ud83d\udccf Published: 2025-06-10T15:17:35.035Z\n\ud83d\udccf Modified: 2025-06-10T15:17:35.035Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-345750.html", "creation_timestamp": "2025-06-10T15:30:58.000000Z"}, {"uuid": "56f78ee6-3699-4f62-a409-6d979dd56cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4058", "type": "seen", "source": "https://t.me/cvedetector/23987", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4058 - Projectworlds Online Examination System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4058 \nPublished : April 29, 2025, 12:15 p.m. | 17\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in Projectworlds Online Examination System 1.0. This affects an unknown part of the file /Bloodgroop_process.php. The manipulation of the argument Pat_BloodGroup1 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-29T15:09:20.000000Z"}, {"uuid": "e29626fd-6a65-475b-848c-d1b4d3d822ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4058", "type": "seen", "source": "Telegram/cGJ944CXyeffrtXPIenZS-eFnFpysOqeEVOOEo7Bip4pVr0", "content": "", "creation_timestamp": "2025-04-29T14:00:48.000000Z"}, {"uuid": "b2ec76a2-92e9-431e-9be3-40ddd9d54263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40583", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2cmyg4m742", "content": "", "creation_timestamp": "2025-05-13T10:48:11.548578Z"}, {"uuid": "ad7af3ea-b672-4557-aa04-4d1306de8a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40582", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2cmzdsie42", "content": "", "creation_timestamp": "2025-05-13T10:48:12.702188Z"}, {"uuid": "5fac6904-5a2d-41ff-9178-d13d3acda496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40580", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2cn24xtt42", "content": "", "creation_timestamp": "2025-05-13T10:48:13.239815Z"}, {"uuid": "ffd71424-6757-4d36-827d-61ce355c236f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40581", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2cn365yuu2", "content": "", "creation_timestamp": "2025-05-13T10:48:34.792827Z"}, {"uuid": "15a1770f-8c51-47db-bfc2-89a9ecd21524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40580", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2cxigtt72r", "content": "", "creation_timestamp": "2025-05-13T10:52:39.037416Z"}, {"uuid": "748b5610-4934-45a9-8a46-58a2b427eef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40581", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2cxioctm2o", "content": "", "creation_timestamp": "2025-05-13T10:52:40.212108Z"}, {"uuid": "31e473aa-eded-4f83-9c72-d05775703d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40582", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2cxj7klu2o", "content": "", "creation_timestamp": "2025-05-13T10:52:43.080390Z"}, {"uuid": "7b304c87-6b3d-49ad-ac3a-a38156119631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40583", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp2cxjjr6i2p", "content": "", "creation_timestamp": "2025-05-13T10:52:44.807869Z"}, {"uuid": "acf931ba-0965-4910-bbfa-8eb6b4adc484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40580", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-18", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "ae044234-fddd-4f10-b665-d72f5be5bfe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40581", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-18", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "93214589-9428-454d-8f05-d15a40a9ad64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40582", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-18", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "fad2f6a6-2cc6-410d-94e5-18636101a9b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40583", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-18", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "62f8c6b2-c239-49e9-ad73-df0729e3b615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40587", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-02", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}, {"uuid": "b00c7274-109c-4245-9c44-591aba1bd1c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40585", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1193", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u0627\u0646\u200c\u0627\u0641\u0632\u0627\u0631 \u062f\u0631 \u062f\u0633\u062a\u06af\u0627\u0647 \u0636\u0628\u0637 \u062e\u0637\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 Elspec G5 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u200c\u0641\u0631\u0636 \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc \u0627\u0633\u062a. \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u06cc \u06a9\u0647 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0639\u0645\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0628\u0647 \u0635\u0648\u0631\u062a \u063a\u06cc\u0631\u0645\u062c\u0627\u0632 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u062f.\n\nCVE-2025-40585\n\n\u0646\u0635\u0628 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u0639\u062a\u0628\u0631. \u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0641\u0639\u0644\u06cc\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u062a\u063a\u06cc\u06cc\u0631 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u200c\u0641\u0631\u0636\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u061b\n- \u062a\u0642\u0633\u06cc\u0645\u200c\u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u061b\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0646\u0641\u0648\u0630 \u0628\u0631\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 (\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u060c \u062b\u0628\u062a) \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u062a\u0644\u0627\u0634\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u061b\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u0627\u0632 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647\u200c\u0647\u0627:\nhttps://cert-portal.siemens.com/productcert/html/ssa-345750.html\n\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-06-13T20:07:00.000000Z"}, {"uuid": "7e0e95bb-96f1-4a95-b9c8-d6e229e44e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40585", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114659894832951143", "content": "", "creation_timestamp": "2025-06-10T15:59:09.545829Z"}, {"uuid": "c7653ca9-7a54-4f03-85a6-e5bdc3f2a3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40585", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrbhyhh7cj2k", "content": "", "creation_timestamp": "2025-06-10T18:01:38.081902Z"}, {"uuid": "3e586ff6-3376-46fb-90e2-20fa8990221b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40585", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-06", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "7224c74c-56f4-42c6-bd53-de118186a69e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4058", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13801", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4058\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in Projectworlds Online Examination System 1.0. This affects an unknown part of the file /Bloodgroop_process.php. The manipulation of the argument Pat_BloodGroup1 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-29T11:31:03.566Z\n\ud83d\udccf Modified: 2025-04-29T11:31:03.566Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306495\n2. https://vuldb.com/?ctiid.306495\n3. https://vuldb.com/?submit.559354\n4. https://github.com/hhhanxx/attack/issues/2#issue-2998883562", "creation_timestamp": "2025-04-29T12:12:31.000000Z"}, {"uuid": "68c142ae-b977-4420-a4b7-1b27881b8749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40582", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16093", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40582\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices do not properly sanitize configuration parameters.\nThis could allow a non-privileged local attacker to execute root commands on the device.\n\ud83d\udccf Published: 2025-05-13T09:39:10.166Z\n\ud83d\udccf Modified: 2025-05-13T09:39:10.166Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-327438.html", "creation_timestamp": "2025-05-13T10:30:16.000000Z"}, {"uuid": "a023d047-8b92-4914-9532-bfe7510d915f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40583", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16092", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40583\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices do transmit sensitive information in cleartext.\nThis could allow a privileged local attacker to retrieve this sensitive information.\n\ud83d\udccf Published: 2025-05-13T09:39:11.578Z\n\ud83d\udccf Modified: 2025-05-13T09:39:11.578Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-327438.html", "creation_timestamp": "2025-05-13T10:30:15.000000Z"}, {"uuid": "7808a055-254b-487e-94b4-95506a58faa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40581", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16094", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-40581\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices are vulnerable to an authentication bypass.\nThis could allow a non-privileged local attacker to bypass the authentication of the SINEMA Remote Connect Edge Client, and to read and modify the configuration parameters.\n\ud83d\udccf Published: 2025-05-13T09:39:08.719Z\n\ud83d\udccf Modified: 2025-05-13T09:39:08.719Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-327438.html", "creation_timestamp": "2025-05-13T10:30:17.000000Z"}, {"uuid": "0f653e75-67bd-47b2-8034-23319d7356d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40581", "type": "seen", "source": "https://t.me/cvedetector/25179", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-40581 - Siemens SCALANCE LPE9403 Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-40581 \nPublished : May 13, 2025, 10:15 a.m. | 51\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices are vulnerable to an authentication bypass.  \nThis could allow a non-privileged local attacker to bypass the authentication of the SINEMA Remote Connect Edge Client, and to read and modify the configuration parameters. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T13:52:12.000000Z"}, {"uuid": "19754aaf-2a32-4634-ac9e-2a1caf479e91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40580", "type": "seen", "source": "https://t.me/cvedetector/25178", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-40580 - Siemens SCALANCE LPE9403 Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-40580 \nPublished : May 13, 2025, 10:15 a.m. | 51\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions). Affected devices are vulnerable to a stack-based buffer overflow.  \nThis could allow a non-privileged local attacker to execute arbitrary code on the device or to cause a denial of service condition. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T13:52:11.000000Z"}, {"uuid": "dfdcacef-9809-4070-bfe4-b7ee95427715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40583", "type": "seen", "source": "https://t.me/cvedetector/25181", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-40583 - SCALANCE LPE9403 Cleartext Sensitive Information Transmission\", \n  \"Content\": \"CVE ID : CVE-2025-40583 \nPublished : May 13, 2025, 10:15 a.m. | 51\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices do transmit sensitive information in cleartext.  \nThis could allow a privileged local attacker to retrieve this sensitive information. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T13:52:16.000000Z"}, {"uuid": "dddce52b-0527-4b99-8ef1-92a6d06e2404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-40582", "type": "seen", "source": "https://t.me/cvedetector/25180", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-40582 - Siemens SCALANCE LPE9403 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-40582 \nPublished : May 13, 2025, 10:15 a.m. | 51\u00a0minutes ago \nDescription : A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices do not properly sanitize configuration parameters.  \nThis could allow a non-privileged local attacker to execute root commands on the device. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T13:52:15.000000Z"}]}