{"vulnerability": "CVE-2025-2072", "sightings": [{"uuid": "35b928b3-9c39-4c9f-9108-2551d0746d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20720", "type": "seen", "source": "https://gist.github.com/Darkcrai86/32425f3e5e9c4b16c78794cb3b4f40f7", "content": "", "creation_timestamp": "2025-10-14T13:27:35.000000Z"}, {"uuid": "86667ebc-1e29-4b8b-a914-84bada877ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-20727", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m4rzdtjapn24", "content": "", "creation_timestamp": "2025-11-04T07:31:57.868537Z"}, {"uuid": "752172c2-7a3d-462f-9f1a-cd58f947242d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20720", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.996510Z"}, {"uuid": "9bfc2b95-739a-4542-9c3b-58f7e18cbd5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20721", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:51.100742Z"}, {"uuid": "cbb11c32-adb6-4c63-830e-401cb065c444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20722", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:51.202713Z"}, {"uuid": "6b95b316-846b-4e99-aedf-5a5152ef4163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20723", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:51.304535Z"}, {"uuid": "73b6a406-a77c-4d2f-9755-8c02048ff570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20724", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:51.403199Z"}, {"uuid": "21fb3375-5a04-4e74-b555-31874507f8bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20729", "type": "seen", "source": "https://gist.github.com/Darkcrai86/a2f8c588d5a0dbb6107299e795be1824", "content": "", "creation_timestamp": "2025-11-04T11:34:54.000000Z"}, {"uuid": "4a0b4a7d-bb66-4cf4-b8d4-5beabc9b8b68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20725", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3m3pqfik6ss2g", "content": "", "creation_timestamp": "2025-10-21T16:21:18.277720Z"}, {"uuid": "ec100cd7-baa8-409c-9ac5-3826301822e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20726", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3m3pqfik6ss2g", "content": "", "creation_timestamp": "2025-10-21T16:21:18.354067Z"}, {"uuid": "ea256717-a560-4d60-acaa-446f382ef050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20727", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3m3pqfik6ss2g", "content": "", "creation_timestamp": "2025-10-21T16:21:18.453464Z"}, {"uuid": "92aafa2d-f5f4-4f3e-b70b-db64c3abc2af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2072", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9621", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2072\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in FAST LTA Silent Brick WebUI, allowing attackers to inject malicious JavaScript code into web pages viewed by users. This issue arises when user-supplied input is improperly handled and reflected directly in the output of a web page without proper sanitization or encoding. Exploiting this vulnerability, an attacker can execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, data theft, and other malicious actions. Affected WebUI parameters are \"h\", \"hd\", \"p\", \"pi\", \"s\", \"t\", \"x\", \"y\".\n\ud83d\udccf Published: 2025-03-31T08:34:14.205Z\n\ud83d\udccf Modified: 2025-03-31T08:45:53.607Z\n\ud83d\udd17 References:\n1. https://www.fast-lta.de/de/fast/silent-bricks-software-2-63", "creation_timestamp": "2025-03-31T09:31:09.000000Z"}, {"uuid": "978fe9b6-54d7-4a95-8d70-e94e35dc45cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2072", "type": "seen", "source": "https://t.me/cvedetector/21578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2072 - \"FAST LTA Silent Brick WebUI Reflected Cross-Site Scripting (XSS)\"\", \n  \"Content\": \"CVE ID : CVE-2025-2072 \nPublished : March 31, 2025, 9:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in FAST LTA Silent Brick WebUI, allowing attackers to inject malicious JavaScript code into web pages viewed by users. This issue arises when user-supplied input is improperly handled and reflected directly in the output of a web page without proper sanitization or encoding. Exploiting this vulnerability, an attacker can execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, data theft, and other malicious actions. Affected WebUI parameters are \"h\", \"hd\", \"p\", \"pi\", \"s\", \"t\", \"x\", \"y\". \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T13:20:28.000000Z"}]}