{"vulnerability": "CVE-2025-45784", "sightings": [{"uuid": "dc78c0db-7e80-495e-a984-da0594fc7c37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45784", "type": "published-proof-of-concept", "source": "Telegram/4HBiddkipVDKS5d3LUOqCrILjbEOa9wvtuqYzTn22K_SmmY", "content": "", "creation_timestamp": "2025-06-18T15:31:20.000000Z"}, {"uuid": "17eada29-63b1-45be-863e-fb728d7459d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45784", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrvjcs4nor2k", "content": "", "creation_timestamp": "2025-06-18T17:18:33.493388Z"}, {"uuid": "1df0f8df-969c-4e79-b618-7de28471789f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45784", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114705126585760087", "content": "", "creation_timestamp": "2025-06-18T15:42:11.685282Z"}, {"uuid": "1dd12a9c-bbf2-4430-bbe2-97e4f7488a3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-45784", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18747", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-45784\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis tools such as strings or xxd, potentially leading to unauthorized access to device functions or user accounts. This vulnerability exists due to insecure storage of sensitive information in the firmware binary.\n\ud83d\udccf Published: 2025-06-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-18T14:25:38.614Z\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://cybermaya.in/posts/Post-37/", "creation_timestamp": "2025-06-18T14:41:48.000000Z"}]}