{"vulnerability": "cve-2025-3847", "sightings": [{"uuid": "6ce24327-1105-442f-bac7-a01a851ea9c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3847", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12773", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3847\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in markparticle WebServer up to 1.0. This affects an unknown part of the file code/http/httprequest.cpp of the component Login. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-21T23:00:11.981Z\n\ud83d\udccf Modified: 2025-04-21T23:00:11.981Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.305775\n2. https://vuldb.com/?ctiid.305775\n3. https://vuldb.com/?submit.556275\n4. https://magnificent-dill-351.notion.site/SQL-Injection-of-Login-in-WebServer-1-0-1d1c693918ed800b847bcc28bd691b7c", "creation_timestamp": "2025-04-22T00:03:17.000000Z"}, {"uuid": "9b7914c7-11c8-4645-aa37-8e18dbd4765a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3847", "type": "seen", "source": "https://t.me/cvedetector/23467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3847 - Markparticle WebServer SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3847 \nPublished : April 21, 2025, 11:15 p.m. | 30\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in markparticle WebServer up to 1.0. This affects an unknown part of the file code/http/httprequest.cpp of the component Login. The manipulation of the argument username/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T02:30:54.000000Z"}, {"uuid": "e29c31b2-eb9f-4552-86b1-43273479cf8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3847", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lneekhkbye23", "content": "", "creation_timestamp": "2025-04-21T23:57:19.853463Z"}, {"uuid": "ba71d5d2-1729-44a8-9808-7a618f1d41da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3847", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lneoz363kz2j", "content": "", "creation_timestamp": "2025-04-22T03:04:28.552029Z"}, {"uuid": "876396ee-0a65-4f96-b68a-bf0c4e192903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/linkersec.bsky.social/post/3m52v7clzc22l", "content": "", "creation_timestamp": "2025-11-07T20:11:51.630108Z"}, {"uuid": "183b964f-2ce6-4e52-87ab-841489fc964d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38479", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12402", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38479\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fsl-edma: free irq correctly in remove path\n\nAdd fsl_edma-&gt;txirq/errirq check to avoid below warning because no\nerrirq at i.MX9 platform. Otherwise there will be kernel dump:\nWARNING: CPU: 0 PID: 11 at kernel/irq/devres.c:144 devm_free_irq+0x74/0x80\nModules linked in:\nCPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.12.0-rc7#18\nHardware name: NXP i.MX93 11X11 EVK board (DT)\nWorkqueue: events_unbound deferred_probe_work_func\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : devm_free_irq+0x74/0x80\nlr : devm_free_irq+0x48/0x80\nCall trace:\n devm_free_irq+0x74/0x80 (P)\n devm_free_irq+0x48/0x80 (L)\n fsl_edma_remove+0xc4/0xc8\n platform_remove+0x28/0x44\n device_remove+0x4c/0x80\n\ud83d\udccf Published: 2025-04-18T07:01:33.022Z\n\ud83d\udccf Modified: 2025-04-18T07:01:33.022Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/55e2dbe2ba787d4fc2306f6bb2f43fb32176e184\n2. https://git.kernel.org/stable/c/38ff8769074db27387cb2323aaa751e59d168e6a\n3. https://git.kernel.org/stable/c/f3834d2d68749e4760c27325149765930ad876fd\n4. https://git.kernel.org/stable/c/fa70c4c3c580c239a0f9e83a14770ab026e8d820", "creation_timestamp": "2025-04-18T07:59:15.000000Z"}, {"uuid": "6747248b-4ecb-44f0-b03f-019b9f5968f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m2ofzjtqog25", "content": "", "creation_timestamp": "2025-10-08T10:17:48.051851Z"}, {"uuid": "737ea793-1914-4ecf-a1d6-ea29426ef9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m2ofzmd6ll2o", "content": "", "creation_timestamp": "2025-10-08T10:17:50.684672Z"}, {"uuid": "e1935e0a-a4b7-4f39-b367-7077a81ee3fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m33wqq6ksg2z", "content": "", "creation_timestamp": "2025-10-13T19:21:42.922705Z"}, {"uuid": "ebe1118b-ccfc-43f4-94d1-aa00b5e52b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3847", "type": "published-proof-of-concept", "source": "Telegram/YCfVgnmoavxFypNs33-g_FdXSNVDehXdI36lApLWWF2GEzg", "content": "", "creation_timestamp": "2025-04-22T01:30:29.000000Z"}, {"uuid": "f2baafb2-c618-4baf-885a-213b347d873d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m364t4ppct27", "content": "", "creation_timestamp": "2025-10-14T16:15:45.140991Z"}, {"uuid": "5953ebe9-0119-4599-8f7b-a53eddce7ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3m364t5geor23", "content": "", "creation_timestamp": "2025-10-14T16:15:45.935906Z"}, {"uuid": "4a5bbb25-d65b-445d-b75d-43c104e1e6a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3m364wkjn76i2", "content": "", "creation_timestamp": "2025-10-14T16:18:24.674963Z"}, {"uuid": "74349524-a510-46f0-b462-599cf935cc0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38477", "type": "seen", "source": "https://gist.github.com/Darkcrai86/d35727d958a2c03c0dc285d81ea121cf", "content": "", "creation_timestamp": "2025-10-08T10:26:45.000000Z"}]}