{"vulnerability": "CVE-2025-6751", "sightings": [{"uuid": "c205a674-f1ed-4aa4-a77b-501bbac58ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-67510", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115697999974272387", "content": "", "creation_timestamp": "2025-12-11T00:02:58.595660Z"}, {"uuid": "fe44f297-8f69-4a60-a376-2478e31a2f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-67510", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7obj33kme2n", "content": "", "creation_timestamp": "2025-12-11T00:02:59.191989Z"}, {"uuid": "19444ced-4e7e-432d-b829-d6acde336267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-67511", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115698241985373769", "content": "", "creation_timestamp": "2025-12-11T01:04:31.086881Z"}, {"uuid": "79718ca1-731c-4f6a-b423-d0f256f177ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-67511", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m7oex4slve2a", "content": "", "creation_timestamp": "2025-12-11T01:04:32.037850Z"}, {"uuid": "ea91abda-3d78-497b-b4f4-1b77e804d305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-67511", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7oeyo6vhw2r", "content": "", "creation_timestamp": "2025-12-11T01:05:23.156730Z"}, {"uuid": "b6c31a31-6372-493f-b1d8-f190afedfb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-67510", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7ofbn3guj22", "content": "", "creation_timestamp": "2025-12-11T01:10:24.298407Z"}, {"uuid": "50c96383-6fbb-4d0d-a11d-c2319f7b9f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-67512", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7omfh3evi2x", "content": "", "creation_timestamp": "2025-12-11T03:17:48.204224Z"}, {"uuid": "c2370770-dd54-41e9-95ac-43c16ca25aaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-67514", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7omjwgpq42o", "content": "", "creation_timestamp": "2025-12-11T03:20:18.518106Z"}, {"uuid": "c183aecb-8e43-4ee5-96c0-1512f40ae189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-67511", "type": "seen", "source": "https://bsky.app/profile/checkmarxzero.bsky.social/post/3m7qlkk2rz526", "content": "", "creation_timestamp": "2025-12-11T22:08:05.420460Z"}, {"uuid": "265c4450-719e-4451-91df-61fa9971ba33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-67511", "type": "seen", "source": "https://bsky.app/profile/checkmarxzero.bsky.social/post/3m7qlkkkxjz2h", "content": "", "creation_timestamp": "2025-12-11T22:08:05.956136Z"}, {"uuid": "93a2a766-c2cd-475b-a5d4-d70ffe7aafbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-6751", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19663", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6751\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in Linksys E8450 up to 1.2.00.360516. This affects the function set_device_language of the file portal.cgi of the component HTTP POST Request Handler. The manipulation of the argument dut_language leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-06-27T03:00:15.299Z\n\ud83d\udccf Modified: 2025-06-27T03:00:15.299Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.314049\n2. https://vuldb.com/?ctiid.314049\n3. https://vuldb.com/?submit.598217\n4. https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md\n5. https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md#poc\n6. https://www.linksys.com/", "creation_timestamp": "2025-06-27T03:51:17.000000Z"}, {"uuid": "57beba50-ba0f-499b-84ad-a29d689fabe5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-6751", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsl4cszoxe2s", "content": "", "creation_timestamp": "2025-06-27T07:24:29.858113Z"}, {"uuid": "4d423a7a-633b-4948-b9b2-63dd1ad6acf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-6751", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114774193882630947", "content": "", "creation_timestamp": "2025-06-30T20:26:56.232645Z"}]}