{"vulnerability": "cve-2025-2553", "sightings": [{"uuid": "590635e2-b68a-4b83-9549-562347cb30ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25535", "type": "seen", "source": "https://t.me/cvedetector/21230", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25535 - SCRIPT CASE HTTP Response Manipulation Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-25535 \nPublished : March 26, 2025, 7:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : HTTP Response Manipulation in SCRIPT CASE v.1.0.002 Build7 allows a remote attacker to escalate privileges via a crafted request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T22:15:40.000000Z"}, {"uuid": "86a0e576-fa30-4e10-ab0b-76f7773633a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25530", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3918", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25530\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-11T20:15:39.327\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://gist.github.com/XiaoCurry/570a765f6812b8c53d35f623ee701b19", "creation_timestamp": "2025-02-11T21:12:35.000000Z"}, {"uuid": "e579d26c-051a-4afe-9c18-c750bac0c1c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25530", "type": "seen", "source": "https://t.me/cvedetector/17759", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25530 - Digital China DCBI-Netlog-LAB Gateway Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25530 \nPublished : Feb. 11, 2025, 8:15 p.m. | 2\u00a0hours, 2\u00a0minutes ago \nDescription : Buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 due to the lack of length verification, which is related to saving parental control configuration information. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T00:04:14.000000Z"}, {"uuid": "486ab2dd-2d61-4ed4-99fa-1120888eddb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2553", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8258", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2553\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been rated as problematic. This issue affects some unknown processing of the file /goform/formVirtualServ. The manipulation leads to improper access controls. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.\n\ud83d\udccf Published: 2025-03-20T17:31:14.449Z\n\ud83d\udccf Modified: 2025-03-20T17:44:27.251Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300167\n2. https://vuldb.com/?ctiid.300167\n3. https://vuldb.com/?submit.516795\n4. https://lavender-bicycle-a5a.notion.site/D-Link-DIR-618-formVirtualServ-1b053a41781f80b28443daabf03c0825?pvs=4\n5. https://lavender-bicycle-a5a.notion.site/D-Link-DIR-605L-formVirtualServ-1b153a41781f80b98645c3f7f4c5f4ae?pvs=4\n6. https://www.dlink.com/", "creation_timestamp": "2025-03-20T18:20:55.000000Z"}, {"uuid": "18abdcfc-b8ff-437f-9f50-31b032038374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25539", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17167", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25539\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Local File Inclusion vulnerability in Vasco v3.14and before allows a remote attacker to obtain sensitive information via help menu.\n\ud83d\udccf Published: 2025-05-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-21T17:00:04.370Z\n\ud83d\udd17 References:\n1. https://drive.google.com/drive/folders/1Va0QP5TtsRprk-pXL3bUfCwTSjYbqnLK?usp=sharing\n2. https://gist.github.com/sornram9254/15eb12579b7acda8ba021217366960bd", "creation_timestamp": "2025-05-21T17:43:24.000000Z"}, {"uuid": "bbe6218d-c3c6-4b20-b367-8cbd17e53943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2553", "type": "seen", "source": "https://t.me/cvedetector/20768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2553 - D-Link DIR-618 and DIR-605L Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2553 \nPublished : March 20, 2025, 6:15 p.m. | 1\u00a0hour, 59\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been rated as problematic. This issue affects some unknown processing of the file /goform/formVirtualServ. The manipulation leads to improper access controls. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T21:35:08.000000Z"}, {"uuid": "d9e37629-a96d-423c-89fe-68aa5e592ed1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25530", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwi35uf322a", "content": "", "creation_timestamp": "2025-02-11T20:17:06.850112Z"}, {"uuid": "b2583a49-b1b9-46a5-b6fe-e087c5c731f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2553", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lktlxaglqn2h", "content": "", "creation_timestamp": "2025-03-20T21:04:07.449488Z"}]}