{"vulnerability": "CVE-2025-3171", "sightings": [{"uuid": "d7ca927c-9600-4fcd-9133-7ae2bfeb65a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31712", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqomzi3npvm2", "content": "", "creation_timestamp": "2025-06-03T06:11:16.800059Z"}, {"uuid": "d323ea53-4e89-4717-a31e-d77455166b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqowkpmmf42m", "content": "", "creation_timestamp": "2025-06-03T09:01:47.999114Z"}, {"uuid": "9b85977f-0b16-40fd-a2fa-2530e80d9e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31711", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqox4mjnye2e", "content": "", "creation_timestamp": "2025-06-03T09:11:48.925492Z"}, {"uuid": "c4c03766-7a07-4566-a98e-66155d7fca1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31712", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqovnfiyn32q", "content": "", "creation_timestamp": "2025-06-03T08:45:24.211058Z"}, {"uuid": "21754a57-4156-4fff-b41c-2f6178424cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3171", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10312", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3171\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in Project Worlds Online Lawyer Management System 1.0. This vulnerability affects unknown code of the file /approve_lawyer.php. The manipulation of the argument unblock_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-03T18:00:15.060Z\n\ud83d\udccf Modified: 2025-04-03T18:00:15.060Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303130\n2. https://vuldb.com/?ctiid.303130\n3. https://vuldb.com/?submit.543273\n4. https://github.com/p1026/CVE/issues/5", "creation_timestamp": "2025-04-03T18:35:47.000000Z"}, {"uuid": "69be296b-6e14-474b-91ec-66f9b444a524", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31719", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3m5dugptkis2j", "content": "", "creation_timestamp": "2025-11-11T09:52:05.262921Z"}, {"uuid": "930cccdd-2b31-4ce9-b47e-88eceefac0b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31715", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lwnatmxetl2a", "content": "", "creation_timestamp": "2025-08-18T01:31:35.731983Z"}, {"uuid": "87bd2888-34f1-44c8-97b7-8eadef3f7db8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-31713", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lwnfua2jla2x", "content": "", "creation_timestamp": "2025-08-18T03:01:24.675768Z"}, {"uuid": "5385cab9-5ce8-4137-9ce4-cb5bff70fc03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31713", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwnjcpz4s52e", "content": "", "creation_timestamp": "2025-08-18T04:03:11.291594Z"}, {"uuid": "d457fcb4-eb51-4c6f-b944-9fa5739d819a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31715", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwnjloo6aq2g", "content": "", "creation_timestamp": "2025-08-18T04:08:12.144704Z"}, {"uuid": "1962168f-056e-43ff-96a1-0a5cbd624fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31715", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lwnzwtr4rs2y", "content": "", "creation_timestamp": "2025-08-18T09:00:54.298967Z"}, {"uuid": "3e056906-4a9c-4549-a02e-fed7d3e42a2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31713", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lwo22zreg22y", "content": "", "creation_timestamp": "2025-08-18T09:03:12.533100Z"}, {"uuid": "d5ab8cfd-c6ea-465c-9078-7fb6cff7556b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/40558", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched devices\nURL\uff1ahttps://github.com/Yuri08loveElaina/CVE_2025_32433_exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-15T13:08:22.000000Z"}, {"uuid": "6400eed2-bb4e-4021-92f6-563f0545c3a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/53589", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models\nURL\uff1ahttps://github.com/AC8999/CVE-2025-32463\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-30T00:29:31.000000Z"}, {"uuid": "2ca3cd20-a27f-4905-a2ca-b9104499caa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/40556", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched devices\nURL\uff1ahttps://github.com/Yuri08loveElaina/CVE-2025-32433-Erlang-OTP-SSH-Pre-Auth-RCE\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-15T12:54:53.000000Z"}, {"uuid": "7c1bbc7e-03d2-4a64-affa-d41ac01daf77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/39495", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched devices\nURL\uff1ahttps://github.com/Skorpion96/unisoc-su\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-06T16:11:11.000000Z"}, {"uuid": "25a2c884-97b4-4322-8ed3-1c9c8d7cb2ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51185", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models\nURL\uff1ahttps://github.com/MKIRAHMET/CVE-2025-29927-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-11T19:32:48.000000Z"}, {"uuid": "50ee0a54-eea8-4edc-ba57-bc9fa4e22fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46436", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models\nURL\uff1ahttps://github.com/Infinit3i/CVE-2025-24893\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-03T16:08:24.000000Z"}, {"uuid": "0f200fbf-a2c5-49fb-ae08-f61da0cefbd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "seen", "source": "Telegram/0HYLGhUKfOaz0jB50dGhU2fq-G_e7X2GSHNTYyogkSMsgQo", "content": "", "creation_timestamp": "2025-06-06T21:00:09.000000Z"}, {"uuid": "00ea21a4-1351-44ef-8630-0d0be2d28bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31710", "type": "published-proof-of-concept", "source": "Telegram/qoq8gL3XX5UbnTPnnKQ1Em6OVDYVUdjE8vvAbgQVpdGtopE", "content": "", "creation_timestamp": "2025-06-07T07:00:06.000000Z"}, {"uuid": "62b90997-adf5-4b3e-b044-74295db3d602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3171", "type": "seen", "source": "https://t.me/cvedetector/22003", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3171 - Project Worlds Online Lawyer Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3171 \nPublished : April 3, 2025, 6:15 p.m. | 56\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in Project Worlds Online Lawyer Management System 1.0. This vulnerability affects unknown code of the file /approve_lawyer.php. The manipulation of the argument unblock_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T21:55:37.000000Z"}]}