{"vulnerability": "CVE-2025-39240", "sightings": [{"uuid": "7a018416-e021-4b4a-ae37-fe1ed33b8de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39240", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lridg2vulw2e", "content": "", "creation_timestamp": "2025-06-13T11:28:24.317047Z"}, {"uuid": "93a1469a-c75f-4372-9b7b-eb6b01777e27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39240", "type": "seen", "source": "Telegram/sBDh5C1zdFlaWSlBVyrMdS-46U_0ME-q4bAhLyd2EZru7fQ", "content": "", "creation_timestamp": "2025-06-13T07:34:25.000000Z"}, {"uuid": "6b34eb89-e39f-4d95-aa8a-564796d74087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39240", "type": "seen", "source": "Telegram/YAQ_JQCmsPiXmqZ7phOl7Olo1teqLC4-3XH11jchkPqYPeM", "content": "", "creation_timestamp": "2025-06-13T09:22:49.000000Z"}, {"uuid": "b88cc003-7549-4567-8810-f4374d331fcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-39240", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-39240\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.\n\ud83d\udccf Published: 2025-06-13T07:10:39.734Z\n\ud83d\udccf Modified: 2025-06-13T07:10:39.734Z\n\ud83d\udd17 References:\n1. https://www.hikvision.com/en/support/cybersecurity/security-advisory/remote-command-execution-vulnerability-in-some-hikvision-wireless-access-point/", "creation_timestamp": "2025-06-13T07:33:06.000000Z"}]}