{"vulnerability": "cve-2025-6619", "sightings": [{"uuid": "b7ef1d12-ed0a-4354-a7c8-43b97f6e67cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/115975641092522338", "content": "", "creation_timestamp": "2026-01-29T00:50:45.076969Z"}, {"uuid": "160c23a9-368a-4236-a9b5-3eaca2af5ab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-6619", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19490", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6619\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. Affected by this vulnerability is the function setUpgradeFW of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-06-25T17:31:10.779Z\n\ud83d\udccf Modified: 2025-06-25T17:31:10.779Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.313837\n2. https://vuldb.com/?ctiid.313837\n3. https://vuldb.com/?submit.602264\n4. https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md\n5. https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md#poc\n6. https://www.totolink.net/", "creation_timestamp": "2025-06-25T18:06:20.000000Z"}, {"uuid": "32f55320-fadc-4f50-adae-0d3877274f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-6619", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114774193882630947", "content": "", "creation_timestamp": "2025-06-30T20:26:59.516873Z"}, {"uuid": "9b49d52e-124c-4849-a4ad-e091b6635948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3mdgas7ldks2x", "content": "", "creation_timestamp": "2026-01-27T17:09:42.286300Z"}, {"uuid": "7432bd5b-08a5-430e-8d58-5166a39435b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://bsky.app/profile/teenigma.bsky.social/post/3mdgnspi53s2b", "content": "", "creation_timestamp": "2026-01-27T21:02:36.441051Z"}, {"uuid": "6b2b8344-5086-4119-9b7d-b8d1d438a502", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3mdh6izwlyg2s", "content": "", "creation_timestamp": "2026-01-28T02:01:25.137751Z"}, {"uuid": "6702ed06-92e2-4d19-805c-be3b644d5a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mdilyfc73g2z", "content": "", "creation_timestamp": "2026-01-28T15:35:19.103876Z"}, {"uuid": "836e1987-885c-43eb-b73f-fb147e2d54f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://gist.github.com/stanibaj/346930313ada772d78a7279f1ab1bd08", "content": "", "creation_timestamp": "2026-04-19T12:47:41.000000Z"}, {"uuid": "c6e02903-ba69-469c-af26-dd5d4fdc4f16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3mf7kbntctv2u", "content": "", "creation_timestamp": "2026-02-19T12:01:07.842564Z"}, {"uuid": "961837fa-a492-47a6-84c3-82b30a75b30e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "b6f673cd-d353-4a21-9dd7-e29a5a81f974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-66199", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/d647957e-5a47-4523-9e9b-00e9f18ef11e", "content": "", "creation_timestamp": "2026-01-28T06:31:10.669948Z"}]}