{"vulnerability": "CVE-2025-2442", "sightings": [{"uuid": "c15b8588-39d3-4eb0-b5b8-843409955519", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24421", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbiy6y3b2s", "content": "", "creation_timestamp": "2025-02-11T18:19:34.436687Z"}, {"uuid": "3a6e86ef-3378-4234-bed1-df2731ae49d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24420", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbiv4mmf2d", "content": "", "creation_timestamp": "2025-02-11T18:19:31.229837Z"}, {"uuid": "58e78f88-ce1c-4505-bc1c-7928bd121bdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24422", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbj2qjif2p", "content": "", "creation_timestamp": "2025-02-11T18:19:37.158634Z"}, {"uuid": "12afa2f7-bfb9-4f0b-9fb0-46da5269ff53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24423", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbj66kxv2p", "content": "", "creation_timestamp": "2025-02-11T18:19:40.798657Z"}, {"uuid": "bb3f2374-f088-4047-a448-b5720854c5a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24424", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbjb4ujx2a", "content": "", "creation_timestamp": "2025-02-11T18:19:43.944807Z"}, {"uuid": "ec1cecab-d7ca-4110-91c5-859203beb6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24427", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbjhzss62a", "content": "", "creation_timestamp": "2025-02-11T18:19:51.172439Z"}, {"uuid": "250fe583-6569-496d-aeaa-849d5219df12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24428", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbjktylp2a", "content": "", "creation_timestamp": "2025-02-11T18:19:54.190370Z"}, {"uuid": "69e98493-87ac-4f01-b719-38916dc0215f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24429", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbjn7hlb2s", "content": "", "creation_timestamp": "2025-02-11T18:19:56.541302Z"}, {"uuid": "ea31b9f4-7dc8-482a-b3c0-f35129011947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24425", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwbjdopov2p", "content": "", "creation_timestamp": "2025-02-11T18:19:46.529411Z"}, {"uuid": "b8d12649-3c64-4e01-afce-38ff5cc494f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2442", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-107-01", "content": "", "creation_timestamp": "2025-04-17T10:00:00.000000Z"}, {"uuid": "a85c92a4-0b96-4c1a-bc9f-9ad9bf46c830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24428", "type": "seen", "source": "https://t.me/cvedetector/17745", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24428 - Adobe Commerce Stored XSS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24428 \nPublished : Feb. 11, 2025, 6:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:37.000000Z"}, {"uuid": "ee14dcf0-3120-49dc-87b5-79487d272c85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24427", "type": "seen", "source": "https://t.me/cvedetector/17744", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24427 - Adobe Commerce Security Feature Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24427 \nPublished : Feb. 11, 2025, 6:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:37.000000Z"}, {"uuid": "21e470bd-bcea-46b4-8c70-ae4ea5c6bee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24422", "type": "seen", "source": "https://t.me/cvedetector/17751", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24422 - Adobe Commerce Improper Access Control Security Feature Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-24422 \nPublished : Feb. 11, 2025, 6:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:45.000000Z"}, {"uuid": "b0f7ca6f-b4ff-4da8-9b2a-2841cc903e03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24421", "type": "seen", "source": "https://t.me/cvedetector/17750", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24421 - Adobe Commerce Incorrect Authorization Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24421 \nPublished : Feb. 11, 2025, 6:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to perform actions with permissions that were not granted. Exploitation of this issue does not require user interaction. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:44.000000Z"}, {"uuid": "e697f97b-9cb5-4201-9e5c-ed5bfcdd4ab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24426", "type": "seen", "source": "https://t.me/cvedetector/17748", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24426 - Adobe Commerce Improper Access Control Vulnerability Allows Security Feature Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-24426 \nPublished : Feb. 11, 2025, 6:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:43.000000Z"}, {"uuid": "cea8013e-4c22-480f-84ed-945d3d81032a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24429", "type": "seen", "source": "https://t.me/cvedetector/17747", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24429 - Adobe Commerce Improper Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24429 \nPublished : Feb. 11, 2025, 6:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T21:33:42.000000Z"}, {"uuid": "f7176fa0-2472-47eb-973b-aa945868d8b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24425", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5406", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24425\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a Business Logic Error vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability to circumvent intended security mechanisms by manipulating the logic of the application's operations causing limited data modification. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:37.917Z\n\ud83d\udccf Modified: 2025-02-25T21:39:49.140Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:23:50.000000Z"}, {"uuid": "10c9a343-e040-4979-bdf6-f51e17900650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24420", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5408", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24420\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to perform actions with permissions that were not granted. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:50.175Z\n\ud83d\udccf Modified: 2025-02-25T21:39:48.320Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:23:52.000000Z"}, {"uuid": "11955a1f-b7b4-4fb0-9f0f-f99d8ee5f21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24427", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12148", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24427\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized write access. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:35.413Z\n\ud83d\udccf Modified: 2025-04-16T19:26:43.805Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-04-16T19:56:36.000000Z"}, {"uuid": "160cdb93-2c18-4b76-8308-5cb3588495e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24429", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5412", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24429\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:45.344Z\n\ud83d\udccf Modified: 2025-02-25T21:39:46.798Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-02-25T22:23:58.000000Z"}, {"uuid": "17116224-f8e2-4bbe-b675-368f2bb0154f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2442", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11037", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2442\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to\nunauthorized access which could result in the loss of confidentially, integrity and availability when a malicious\nuser, having physical access, sets the radio to the factory default mode.\n\ud83d\udccf Published: 2025-04-09T10:26:01.874Z\n\ud83d\udccf Modified: 2025-04-09T10:26:01.874Z\n\ud83d\udd17 References:\n1. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-098-02&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-098-02.pdf", "creation_timestamp": "2025-04-09T10:47:55.000000Z"}, {"uuid": "00d21382-7cf3-4863-a88e-9180957a2c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24420", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11864", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24420\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to modify select data. Exploitation of this issue does not require user interaction.\n\ud83d\udccf Published: 2025-02-11T17:37:50.175Z\n\ud83d\udccf Modified: 2025-04-15T16:49:03.773Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-04-15T16:55:31.000000Z"}, {"uuid": "a52135d3-c6df-4e96-bc7a-02d912361cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24421", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11863", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24421\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could exploit this vulnerability to modify select data. Exploitation of this issue does not require user interaction\n\ud83d\udccf Published: 2025-02-11T17:37:37.036Z\n\ud83d\udccf Modified: 2025-04-15T16:51:04.190Z\n\ud83d\udd17 References:\n1. https://helpx.adobe.com/security/products/magento/apsb25-08.html", "creation_timestamp": "2025-04-15T16:55:30.000000Z"}, {"uuid": "2f88b766-6146-4386-a0fa-33f3b5239515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2442", "type": "seen", "source": "https://t.me/cvedetector/22556", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2442 - Cisco Wireless Router Default Initialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2442 \nPublished : April 9, 2025, 11:15 a.m. | 50\u00a0minutes ago \nDescription : CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to  \nunauthorized access which could result in the loss of confidentially, integrity and availability when a malicious  \nuser, having physical access, sets the radio to the factory default mode. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T14:15:56.000000Z"}]}