{"vulnerability": "cve-2025-2772", "sightings": [{"uuid": "f49205ef-bb10-4865-8aeb-d753ddbf77fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27728", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "ec0c8b0d-6bae-4fa8-a16f-a3fafbefae46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "7f648dbe-9616-441e-845d-4ad264f07315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27729", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "7e75898f-92bb-43a9-b417-0d07b22e1349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114388579201738740", "content": "", "creation_timestamp": "2025-04-23T18:00:02.075155Z"}, {"uuid": "7c91c7a3-9148-40ad-ba76-45e17c3a2da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3loozcq6f5gh2", "content": "", "creation_timestamp": "2025-05-08T23:16:42.679133Z"}, {"uuid": "4f16010e-e6ad-43df-830e-57f5c7c8c925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27724", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3luzwc47lt52v", "content": "", "creation_timestamp": "2025-07-28T15:37:03.514045Z"}, {"uuid": "4086997d-b217-4b04-b9f3-b0528118ef5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27724", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luzxmxnto72j", "content": "", "creation_timestamp": "2025-07-28T16:01:01.088348Z"}, {"uuid": "ab619bd0-89ef-4148-9d42-8d6a0ff7e655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}, {"uuid": "1cc5886a-9771-4133-a013-2926a64e3656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27726", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9283", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27726\n\ud83d\udd25 CVSS Score: 2.1 (cvssV3_0, Vector: CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file download process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, the product's files may be obtained and/or altered by a crafted HTTP request to specific functions of the product from a device connected to the LAN side.\n\ud83d\udccf Published: 2025-03-28T08:18:49.092Z\n\ud83d\udccf Modified: 2025-03-28T08:18:49.092Z\n\ud83d\udd17 References:\n1. https://kddi-tech.com/contents/appendix_L2_06.html#64433e4a-8946-9c06-bddf-91cbfe56c8e5\n2. https://jvn.jp/en/jp/JVN04278547/", "creation_timestamp": "2025-03-28T08:27:24.000000Z"}, {"uuid": "4f36b364-95eb-4d01-bd14-01c7951919b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11185", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27727\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-04-08T17:24:05.243Z\n\ud83d\udccf Modified: 2025-04-09T23:42:04.605Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727", "creation_timestamp": "2025-04-09T23:48:03.000000Z"}, {"uuid": "2fb0b3f2-3999-4c6a-98b7-b04b7f1cf059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27729", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11184", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27729\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows Shell allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-04-08T17:24:05.843Z\n\ud83d\udccf Modified: 2025-04-09T23:42:05.212Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729", "creation_timestamp": "2025-04-09T23:48:02.000000Z"}, {"uuid": "773f31eb-6f36-4814-b0a4-81dbbd2d51c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://t.me/cvedetector/24884", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27720 - Pixmeo Osirix MD Unencrypted Credential Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27720 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:41.000000Z"}, {"uuid": "e30b687d-0690-47ae-90e5-f773542720ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "https://t.me/cvedetector/23599", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2772 - BEC Technologies Router Credentials Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2772 \nPublished : April 23, 2025, 5:16 p.m. | 59\u00a0minutes ago \nDescription : BEC Technologies Multiple Routers Insufficiently Protected Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability.  \n  \nThe specific flaw exists within /cgi-bin/tools_usermanage.asp. The issue results from transmitting a list of users and their credentials to be handled on the client side. An attacker can leverage this vulnerability to disclose transported credentials, leading to further compromise. Was ZDI-CAN-25895. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T21:10:16.000000Z"}, {"uuid": "7229dcd9-2abe-476a-a4bd-98e64ed005bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27726", "type": "seen", "source": "https://t.me/cvedetector/21387", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27726 - HGW-BL1500HM Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27726 \nPublished : March 28, 2025, 9:15 a.m. | 1\u00a0hour, 1\u00a0minute ago \nDescription : Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in the file download process of the USB storage file-sharing function of HGW-BL1500HM Ver 002.002.003 and earlier. If this vulnerability is exploited, the product's files may be obtained and/or altered by a crafted HTTP request to specific functions of the product from a device connected to the LAN side. \nSeverity: 2.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T11:53:25.000000Z"}, {"uuid": "a9bc1c04-5c1c-4abb-bda9-1eba34fedc88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2772", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-185/", "content": "", "creation_timestamp": "2025-03-25T04:00:00.000000Z"}, {"uuid": "08bd8a8e-db54-4c7f-b122-8db3a30e48bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27729", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lmzwe6av4h26", "content": "", "creation_timestamp": "2025-04-17T20:16:39.327642Z"}, {"uuid": "a09ecb02-80e2-4ca5-ad56-f46fd4a8b641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27722", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11031", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27722\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information.\n\ud83d\udccf Published: 2025-04-09T09:03:26.029Z\n\ud83d\udccf Modified: 2025-04-09T09:03:26.029Z\n\ud83d\udd17 References:\n1. https://www.inaba.co.jp/abaniact/news/security_20250404.pdf\n2. https://jvn.jp/en/vu/JVNVU93925742/", "creation_timestamp": "2025-04-09T09:47:32.000000Z"}, {"uuid": "282511a7-fcf2-48f7-8109-c73a8cb13ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27720", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15642", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27720\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: The Pixmeo Osirix MD Web Portal sends credential information without encryption, which could allow an attacker to steal credentials.\n\ud83d\udccf Published: 2025-05-08T22:43:28.046Z\n\ud83d\udccf Modified: 2025-05-08T22:43:28.046Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-128-01\n2. https://www.osirix-viewer.com/osirix/osirix-md/\n3. https://www.osirix-viewer.com/about/contact/", "creation_timestamp": "2025-05-08T23:24:06.000000Z"}, {"uuid": "57f11888-883e-4cd8-8dd0-f73d56c06bdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27722", "type": "seen", "source": "https://t.me/cvedetector/22548", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27722 - Wi-Fi AP UNIT AC-WPS-11ac Series Cleartext Transmission of Sensitive Information Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27722 \nPublished : April 9, 2025, 9:15 a.m. | 48\u00a0minutes ago \nDescription : Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T12:35:33.000000Z"}]}