<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T17:22:08.151940+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7fe90e24-05ab-4ae2-9084-d4042cc8d530/export</id>
    <title>7fe90e24-05ab-4ae2-9084-d4042cc8d530</title>
    <updated>2026-05-09T17:22:08.539047+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7fe90e24-05ab-4ae2-9084-d4042cc8d530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6103", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18393", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6103\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in Wifi-soft UniBox Controller up to 20250506. Affected by this issue is some unknown functionality of the file /billing/test_accesscodelogin.php. The manipulation of the argument Password leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-06-16T03:00:12.081Z\n\ud83d\udccf Modified: 2025-06-16T03:00:12.081Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.312572\n2. https://vuldb.com/?ctiid.312572\n3. https://vuldb.com/?submit.590734\n4. https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2025/1/Command%20Injection%20Vulnerability%20in%20Wifi-soft%20UniBox%20controller-billing-test_accesscodelogin.pdf", "creation_timestamp": "2025-06-16T03:35:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7fe90e24-05ab-4ae2-9084-d4042cc8d530/export"/>
    <published>2025-06-16T03:35:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/05c443f3-9722-4265-910b-d6808d3ce442/export</id>
    <title>05c443f3-9722-4265-910b-d6808d3ce442</title>
    <updated>2026-05-09T17:22:08.538968+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "05c443f3-9722-4265-910b-d6808d3ce442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6103", "type": "published-proof-of-concept", "source": "Telegram/IWgL-7hijIDfZWh3thMsnAy1768rz69pWolDkfnZ1T6kfIs", "content": "", "creation_timestamp": "2025-06-16T04:02:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/05c443f3-9722-4265-910b-d6808d3ce442/export"/>
    <published>2025-06-16T04:02:17+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e5697fa3-90b5-4bb3-82cf-f4b94cdaab6a/export</id>
    <title>e5697fa3-90b5-4bb3-82cf-f4b94cdaab6a</title>
    <updated>2026-05-09T17:22:08.538874+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e5697fa3-90b5-4bb3-82cf-f4b94cdaab6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6103", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114691057117107590", "content": "", "creation_timestamp": "2025-06-16T04:04:08.851571Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e5697fa3-90b5-4bb3-82cf-f4b94cdaab6a/export"/>
    <published>2025-06-16T04:04:08.851571+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fac844d5-79ef-4924-b7cb-0c98c76e433e/export</id>
    <title>fac844d5-79ef-4924-b7cb-0c98c76e433e</title>
    <updated>2026-05-09T17:22:08.538774+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fac844d5-79ef-4924-b7cb-0c98c76e433e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrph3qmtam23", "content": "", "creation_timestamp": "2025-06-16T07:22:50.940441Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fac844d5-79ef-4924-b7cb-0c98c76e433e/export"/>
    <published>2025-06-16T07:22:50.940441+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/40d74533-2df1-48f1-aa2e-0fcc6165a080/export</id>
    <title>40d74533-2df1-48f1-aa2e-0fcc6165a080</title>
    <updated>2026-05-09T17:22:08.538689+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "40d74533-2df1-48f1-aa2e-0fcc6165a080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61035", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3s43htaz72u", "content": "", "creation_timestamp": "2025-10-22T14:55:46.031763Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/40d74533-2df1-48f1-aa2e-0fcc6165a080/export"/>
    <published>2025-10-22T14:55:46.031763+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bd268ba9-92ec-4575-9520-d8a10c1e5176/export</id>
    <title>bd268ba9-92ec-4575-9520-d8a10c1e5176</title>
    <updated>2026-05-09T17:22:08.538596+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bd268ba9-92ec-4575-9520-d8a10c1e5176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61037", "type": "seen", "source": "https://gist.github.com/GunP4ng/42b19ee99e94c315173b74a9fb26c2b9", "content": "", "creation_timestamp": "2025-12-30T08:05:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bd268ba9-92ec-4575-9520-d8a10c1e5176/export"/>
    <published>2025-12-30T08:05:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3a04ef0e-f426-403e-9c71-c4c956c990b3/export</id>
    <title>3a04ef0e-f426-403e-9c71-c4c956c990b3</title>
    <updated>2026-05-09T17:22:08.538458+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3a04ef0e-f426-403e-9c71-c4c956c990b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61037", "type": "seen", "source": "https://gist.github.com/jc0818/233462416579661e4e2795f96457a6bf", "content": "", "creation_timestamp": "2025-12-30T08:33:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3a04ef0e-f426-403e-9c71-c4c956c990b3/export"/>
    <published>2025-12-30T08:33:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/04c46356-80e9-47eb-83eb-181e9e5aa04e/export</id>
    <title>04c46356-80e9-47eb-83eb-181e9e5aa04e</title>
    <updated>2026-05-09T17:22:08.535752+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "04c46356-80e9-47eb-83eb-181e9e5aa04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61037", "type": "seen", "source": "Telegram/JxPXMx_RS9I7Z3kYw2DwOkNmPXjWN_fhlFmYgdz0OY1MqXE", "content": "", "creation_timestamp": "2026-01-02T21:53:17.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/04c46356-80e9-47eb-83eb-181e9e5aa04e/export"/>
    <published>2026-01-02T21:53:17+00:00</published>
  </entry>
</feed>
