{"vulnerability": "cve-2025-4903", "sightings": [{"uuid": "09dd1742-7775-4bb6-a1c6-5fa8cb8244bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4903", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16787", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4903\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&amp;remote_management=0&amp;http_passwd=game&amp;exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-19T00:31:04.582Z\n\ud83d\udccf Modified: 2025-05-19T00:31:04.582Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309459\n2. https://vuldb.com/?ctiid.309459\n3. https://vuldb.com/?submit.578051\n4. https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/webgl_asp.md\n5. https://www.dlink.com/", "creation_timestamp": "2025-05-19T01:37:59.000000Z"}]}