{"vulnerability": "CVE-2025-23115", "sightings": [{"uuid": "df762876-a965-478f-9e99-50d3d4ba61f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lko3pkyhkv26", "content": "", "creation_timestamp": "2025-03-18T16:30:10.598640Z"}, {"uuid": "44d883aa-020f-4333-8c94-37ccb2d22712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://t.me/cvedetector/19202", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23115 - \"UniFi Protect Cameras Use After Free RCE\"\", \n  \"Content\": \"CVE ID : CVE-2025-23115 \nPublished : March 1, 2025, 3:15 a.m. | 1\u00a0hour, 26\u00a0minutes ago \nDescription : A Use After Free vulnerability on UniFi Protect Cameras could allow a Remote Code Execution (RCE) by a malicious actor with access to UniFi Protect Cameras management network. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T06:24:38.000000Z"}, {"uuid": "4a13c044-5f1d-432e-9675-8b3707d34d41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114088884159028871", "content": "", "creation_timestamp": "2025-03-01T19:43:38.391582Z"}, {"uuid": "977646a8-e4b9-412e-ae6a-1c6a6145a4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114089102309160033", "content": "", "creation_timestamp": "2025-03-01T20:39:07.642708Z"}, {"uuid": "0dabe8c3-110f-4ee5-b242-06e8384c3166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114085601805636513", "content": "", "creation_timestamp": "2025-03-01T05:48:53.626729Z"}, {"uuid": "461602cb-111f-4802-9fa8-6c9671f0ed35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "d06bcb2e-b3f6-41a7-816a-862276b3b9d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lio52ao6nk2s", "content": "", "creation_timestamp": "2025-02-21T06:03:43.947216Z"}, {"uuid": "5e62b5c4-07cb-4e64-a389-1c5748260d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lio52kijak2k", "content": "", "creation_timestamp": "2025-02-21T06:03:50.823339Z"}, {"uuid": "cf3b1a4e-ee55-4399-8587-af9dd6d60d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-23115", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lio5i33jsk2g", "content": "", "creation_timestamp": "2025-02-21T06:11:23.015063Z"}, {"uuid": "a8324bdc-4269-4ff1-b9c5-f352ee833e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3liofytij2e25", "content": "", "creation_timestamp": "2025-02-21T08:43:55.216921Z"}, {"uuid": "30b35875-e66e-4926-8326-5e1911db65c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23115\n\ud83d\udd25 CVSS Score: 9 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A Use After Free vulnerability on UniFi Protect Cameras could allow a Remote Code Execution (RCE) by a malicious actor with access to UniFi Protect Cameras management network.\n\ud83d\udccf Published: 2025-03-01T01:52:36.149Z\n\ud83d\udccf Modified: 2025-03-01T01:52:36.149Z\n\ud83d\udd17 References:\n1. https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f", "creation_timestamp": "2025-03-01T02:27:20.000000Z"}, {"uuid": "7b2e337e-a51c-4c95-b0f4-7f729c1994ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://t.me/cybersecplayground/106", "content": "\ud83d\udea8\ud83d\udea8 HACKER ALERT: UBIQUITI UNIFI CAMERAS UNDER ATTACK!\n\n\u26a0\ufe0f CVE-2025-23115: Remote Code Execution (RCE) = Total Camera Takeover!\n\u26a0\ufe0f CVE-2025-23116: Auth Bypass via Auto-Adopt Bridge.\n\n\ud83d\udd0d ZoomEye Dork:\napp=\"Ubiquiti UniFi Protect\"\n3.2K+ Vulnerable Hits!\n\n\ud83d\udd17 SHODAN Dork:\ntitle:\"UniFi Protect\"\n\n\ud83d\udd17 ZoomEye Search Link:\nZoomEye Link\n\n\ud83d\udcf0 Details:\nRead full details about these vulnerabilities and how hackers can hijack Ubiquiti UniFi Protect cameras:\n\ud83d\udd17 Read More\n\n\ud83d\udce2 Stay updated with more security alerts and insights:\n\ud83d\udc49 @cybersecplayground\n\n#CVE2025 #Ubiquiti #UniFiProtect #RCE #BugBounty #InfoSec #CyberSecurity #Vulnerability #RemoteCodeExecution", "creation_timestamp": "2025-02-22T10:36:33.000000Z"}, {"uuid": "f7a75864-b9e7-4bf0-ad79-428f325c0287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "https://t.me/CyberBulletin/2871", "content": "\u26a1CVE-2025-23115 &amp; CVE-2025-23116: Hackers Can Hijack Ubiquiti UniFi Protect Cameras.\n\n#CyberBulletin", "creation_timestamp": "2025-04-01T04:04:04.000000Z"}, {"uuid": "11eb5d63-2460-40de-9e16-9925eec4d448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23115", "type": "seen", "source": "Telegram/QSz1yTOzb82bVMuPnbkspKqsLKsiaeO81Rox7_KUFFLvrk4", "content": "", "creation_timestamp": "2025-02-22T13:01:59.000000Z"}]}