<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T01:56:36.548097+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2dd2cd74-e1fe-4bcb-9dd7-d6b61f96dd82/export</id>
    <title>2dd2cd74-e1fe-4bcb-9dd7-d6b61f96dd82</title>
    <updated>2026-05-09T01:56:36.942294+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2dd2cd74-e1fe-4bcb-9dd7-d6b61f96dd82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30122", "type": "seen", "source": "https://t.me/cvedetector/20575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30122 - Roadcam X3 Default Credential Vulnerability (Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2025-30122 \nPublished : March 18, 2025, 3:16 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2dd2cd74-e1fe-4bcb-9dd7-d6b61f96dd82/export"/>
    <published>2025-03-18T17:44:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/92c8b1f5-bfd5-4e0e-aedb-a55619e8185c/export</id>
    <title>92c8b1f5-bfd5-4e0e-aedb-a55619e8185c</title>
    <updated>2026-05-09T01:56:36.942182+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "92c8b1f5-bfd5-4e0e-aedb-a55619e8185c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30123", "type": "seen", "source": "https://t.me/cvedetector/20576", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30123 - Roadcam X3 Hardcoded FTP Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30123 \nPublished : March 18, 2025, 3:16 p.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : An issue was discovered on ROADCAM X3 devices. The mobile app APK (Viidure) contains hardcoded FTP credentials for the FTPX user account, enabling attackers to gain unauthorized access and extract sensitive recorded footage from the device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T17:44:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/92c8b1f5-bfd5-4e0e-aedb-a55619e8185c/export"/>
    <published>2025-03-18T17:44:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d49b3b96-c58a-447b-9b65-04acae053fd3/export</id>
    <title>d49b3b96-c58a-447b-9b65-04acae053fd3</title>
    <updated>2026-05-09T01:56:36.942066+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d49b3b96-c58a-447b-9b65-04acae053fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30122", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkobie4c4v26", "content": "", "creation_timestamp": "2025-03-18T18:13:37.945871Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d49b3b96-c58a-447b-9b65-04acae053fd3/export"/>
    <published>2025-03-18T18:13:37.945871+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4d3ae95e-310f-43d5-adf0-142730c172ff/export</id>
    <title>4d3ae95e-310f-43d5-adf0-142730c172ff</title>
    <updated>2026-05-09T01:56:36.941964+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4d3ae95e-310f-43d5-adf0-142730c172ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30123", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkobiedw4j2m", "content": "", "creation_timestamp": "2025-03-18T18:13:39.212431Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4d3ae95e-310f-43d5-adf0-142730c172ff/export"/>
    <published>2025-03-18T18:13:39.212431+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e2733df5-c3eb-4c09-8413-970faa693d79/export</id>
    <title>e2733df5-c3eb-4c09-8413-970faa693d79</title>
    <updated>2026-05-09T01:56:36.941856+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e2733df5-c3eb-4c09-8413-970faa693d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30122", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8338", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30122\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:59:34.498Z\n\ud83d\udd17 References:\n1. https://roadcam.my/pages/install-x3\n2. https://github.com/geo-chen/RoadCam", "creation_timestamp": "2025-03-21T14:19:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e2733df5-c3eb-4c09-8413-970faa693d79/export"/>
    <published>2025-03-21T14:19:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/af16e149-9c2e-4abb-be0d-4868b7c83c8d/export</id>
    <title>af16e149-9c2e-4abb-be0d-4868b7c83c8d</title>
    <updated>2026-05-09T01:56:36.941719+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "af16e149-9c2e-4abb-be0d-4868b7c83c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30123", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8404", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30123\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered on ROADCAM X3 devices. The mobile app APK (Viidure) contains hardcoded FTP credentials for the FTPX user account, enabling attackers to gain unauthorized access and extract sensitive recorded footage from the device.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T17:56:19.116Z\n\ud83d\udd17 References:\n1. https://roadcam.my/pages/install-x3\n2. https://github.com/geo-chen/RoadCam", "creation_timestamp": "2025-03-21T18:20:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/af16e149-9c2e-4abb-be0d-4868b7c83c8d/export"/>
    <published>2025-03-21T18:20:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5b7e5126-76e8-461b-b255-5152e1b0c081/export</id>
    <title>5b7e5126-76e8-461b-b255-5152e1b0c081</title>
    <updated>2026-05-09T01:56:36.941609+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5b7e5126-76e8-461b-b255-5152e1b0c081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30126", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luzwa74hu42w", "content": "", "creation_timestamp": "2025-07-28T15:35:58.651119Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5b7e5126-76e8-461b-b255-5152e1b0c081/export"/>
    <published>2025-07-28T15:35:58.651119+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4a0c914b-93cb-4ce3-8529-e250cdab4d6f/export</id>
    <title>4a0c914b-93cb-4ce3-8529-e250cdab4d6f</title>
    <updated>2026-05-09T01:56:36.941450+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4a0c914b-93cb-4ce3-8529-e250cdab4d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30127", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lvqyn7c5go2s", "content": "", "creation_timestamp": "2025-08-06T19:50:16.681909Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4a0c914b-93cb-4ce3-8529-e250cdab4d6f/export"/>
    <published>2025-08-06T19:50:16.681909+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/606b881d-956c-424b-9cc8-5e3adc343048/export</id>
    <title>606b881d-956c-424b-9cc8-5e3adc343048</title>
    <updated>2026-05-09T01:56:36.938697+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "606b881d-956c-424b-9cc8-5e3adc343048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-30127", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lvs2ruvgbh2b", "content": "", "creation_timestamp": "2025-08-07T06:01:21.856094Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/606b881d-956c-424b-9cc8-5e3adc343048/export"/>
    <published>2025-08-07T06:01:21.856094+00:00</published>
  </entry>
</feed>
