{"vulnerability": "CVE-2025-1340", "sightings": [{"uuid": "486a2006-4976-49bf-ad10-fa9139e5ef1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3licrw5gusj2c", "content": "", "creation_timestamp": "2025-02-16T17:45:13.153907Z"}, {"uuid": "e71ca35e-0da1-4b16-9380-6fb18ac71ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114010633927355224", "content": "", "creation_timestamp": "2025-02-16T00:03:34.436646Z"}, {"uuid": "7439accb-8ab3-4dee-96ac-2c45cc850084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114013833634093008", "content": "", "creation_timestamp": "2025-02-16T13:37:18.137438Z"}, {"uuid": "fc9df96c-b2af-409b-8ff1-d2f0120bb8a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3licg7jpzuu2h", "content": "", "creation_timestamp": "2025-02-16T14:15:42.995247Z"}, {"uuid": "b0d21f00-bc8e-45db-8854-6765ecdb6d55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114014113155961005", "content": "", "creation_timestamp": "2025-02-16T14:48:23.778732Z"}, {"uuid": "dedd39c1-dee5-4ba3-ab98-031990275bf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114014605945018041", "content": "", "creation_timestamp": "2025-02-16T16:53:43.384057Z"}, {"uuid": "0c5bdd6c-a7d2-43ee-bd5f-b050c13d9f28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13405", "type": "seen", "source": "https://gist.github.com/Darkcrai86/9bb71d423bceedc4ba31315f5ec67786", "content": "", "creation_timestamp": "2025-11-25T09:11:40.000000Z"}, {"uuid": "fabf22b3-517d-4850-8b7b-607cece991fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lif3ckd4v22t", "content": "", "creation_timestamp": "2025-02-17T15:38:35.322322Z"}, {"uuid": "e89fe2ae-002c-48f5-8cc8-246117d4b5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lif3clndhs2t", "content": "", "creation_timestamp": "2025-02-17T15:38:35.864151Z"}, {"uuid": "0d10bc0b-a4c2-4d2d-be1e-02dfa855bd68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lifjzq2s6f2a", "content": "", "creation_timestamp": "2025-02-17T20:02:02.896836Z"}, {"uuid": "18b9b32a-6719-4a53-97c2-a3461a45d8a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13400", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5yzcakg7r2q", "content": "", "creation_timestamp": "2025-11-19T19:44:53.532466Z"}, {"uuid": "6a4abe1d-f2e9-4c12-8285-84d8e022e85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13401", "type": "seen", "source": "https://gist.github.com/Darkcrai86/94ee27215232f832e281972fe68c11b2", "content": "", "creation_timestamp": "2025-12-03T15:54:57.000000Z"}, {"uuid": "eb15a9a1-0192-4f59-9cce-31f46a8d6bcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13404", "type": "seen", "source": "https://gist.github.com/Darkcrai86/c5f531480f38ded5dcab4d547fa56ca5", "content": "", "creation_timestamp": "2025-11-25T09:13:06.000000Z"}, {"uuid": "975568a1-6f48-4906-b915-efb6707805ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "b3c89e51-4762-4186-95f1-395c9eb862e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13400", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115577514792992435", "content": "", "creation_timestamp": "2025-11-19T17:21:59.147399Z"}, {"uuid": "aa7b71c0-6b9c-447d-a6eb-1e1209e0e22a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13408", "type": "seen", "source": "https://gist.github.com/Darkcrai86/dcc1cc5e05b600ab65dcb7ae6c4db8c4", "content": "", "creation_timestamp": "2025-12-12T08:28:59.000000Z"}, {"uuid": "6efc4698-4b83-465a-98d8-2cc64b249556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13407", "type": "seen", "source": "https://gist.github.com/Darkcrai86/292b8d051a421c83854f25a16cd87e1d", "content": "", "creation_timestamp": "2025-12-24T11:45:48.000000Z"}, {"uuid": "5f4e0273-4a33-4e62-a0d9-b2b97b54a8b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13407", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mapsnoxrt42x", "content": "", "creation_timestamp": "2025-12-24T08:07:38.944095Z"}, {"uuid": "a3920884-cdb7-4da6-8c4b-c0d80142e038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-13403", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m7u2yn6lqe2e", "content": "", "creation_timestamp": "2025-12-13T07:22:23.308926Z"}, {"uuid": "31023029-7253-4891-acb4-f47ee9c795e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "published-proof-of-concept", "source": "Telegram/Jj_L7Gg0eMjN7fWeLwMwx-Tw4Rzgb_d4eKRJ0TovJlioCCk", "content": "", "creation_timestamp": "2025-02-16T15:30:23.000000Z"}, {"uuid": "a8464439-2e58-40a6-9d35-dd0a634d9fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4594", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1340\n\ud83d\udd25 CVSS Score: 8.7 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-02-16T15:30:49Z\n\ud83d\udccf Modified: 2025-02-16T15:30:49Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1340\n2. https://github.com/stevenchen0x01/CVE2/blob/main/stack_overflow.md\n3. https://vuldb.com/?ctiid.295956\n4. https://vuldb.com/?id.295956\n5. https://vuldb.com/?submit.495368\n6. https://www.totolink.net", "creation_timestamp": "2025-02-16T16:12:35.000000Z"}, {"uuid": "5ebf74fa-48bc-4cbf-840d-6b8c69495d66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://t.me/TheDarkWebInformer/12748", "content": "\ud83d\udea8Critical Security Vulnerability in TOTOLINK X18 9.1.0cu.2024_B20220329\n\n\ud83c\udd94 CVE: CVE-2025-1340\n\ud83d\udca3 CVSS Score: 8.7\n\ud83d\udcc5 Published Date: 25/02/16\n\u26a0\ufe0f Details: A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. \n\nAffected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow.\n\nIt is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\nNIST: https://nvd.nist.gov/vuln/detail/CVE-2025-1340", "creation_timestamp": "2025-02-16T17:54:00.000000Z"}, {"uuid": "637ea579-a09d-4725-bf3f-9d956e821c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4591", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1340\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-16T14:15:21.130\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/stevenchen0x01/CVE2/blob/main/stack_overflow.md\n2. https://vuldb.com/?ctiid.295956\n3. https://vuldb.com/?id.295956\n4. https://vuldb.com/?submit.495368\n5. https://www.totolink.net/", "creation_timestamp": "2025-02-16T15:11:18.000000Z"}, {"uuid": "3520fbe8-e398-4283-8196-4e7db157f4c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1340", "type": "seen", "source": "https://t.me/cvedetector/18188", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1340 - TOTOLINK X18 Stack-Based Buffer Overflow Remote Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1340 \nPublished : Feb. 16, 2025, 2:15 p.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-16T17:07:29.000000Z"}]}