{"vulnerability": "CVE-2025-43928", "sightings": [{"uuid": "3f8d36c5-ad3e-48b0-8854-c930e9217795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43928", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ln7xme3jeih2", "content": "", "creation_timestamp": "2025-04-20T05:55:21.562621Z"}, {"uuid": "3f661a78-8b12-4675-8803-61a389110bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43928", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lna2ebsbpb2g", "content": "", "creation_timestamp": "2025-04-20T06:44:16.063925Z"}, {"uuid": "5294c350-bf3a-4a5b-9b9c-69dad475c12b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43928", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114371130210376471", "content": "", "creation_timestamp": "2025-04-20T16:02:31.493787Z"}, {"uuid": "7f3059be-42f5-4fa1-8a16-4fc790254104", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-43928", "type": "seen", "source": "https://mint-secure.de/path-traversal-vulnerability-in-surveillance-software/", "content": "", "creation_timestamp": "2025-04-22T12:15:13.664928Z"}, {"uuid": "e73e04ae-aeea-4557-8e12-739e88ef9619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-43928", "type": "seen", "source": "https://vulnerability.circl.lu/comment/a7120db2-1a20-4a03-849d-4688d5ea7992", "content": "", "creation_timestamp": "2025-04-22T12:20:06.408225Z"}, {"uuid": "52382b2f-4f8c-4a7d-be4a-e1ddaccb0a3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43928", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12606", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43928\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: In Infodraw Media Relay Service (MRS) 7.1.0.0, the MRS web server (on port 12654) allows reading arbitrary files via ../ directory traversal in the username field. Reading ServerParameters.xml may reveal administrator credentials in cleartext or with MD5 hashing.\n\ud83d\udccf Published: 2025-04-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-20T01:53:40.127Z\n\ud83d\udd17 References:\n1. https://mint-secure.de/path-traversal-vulnerability-in-surveillance-software/\n2. https://cfp.eh22.easterhegg.eu/eh22/talk/9UDXSE/", "creation_timestamp": "2025-04-20T03:02:00.000000Z"}, {"uuid": "589c4dea-b49c-4ed8-929a-982a26337596", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43928", "type": "exploited", "source": "https://t.me/thehackernews/6724", "content": "\ud83d\udc40 Hackers could be one path away from your sensitive files!\n\n\ud83d\udea8 New CVEs expose major flaws in Rack &amp; Infodraw systems:\n\n\ud83d\udd39 CVE-2025-27610 lets attackers read config files &amp; credentials via path traversal.\n\n\ud83d\udd39 Infodraw CVE-2025-43928 allows any file to be read or deleted\u2014no login needed.\n\nLearn more: https://thehackernews.com/2025/04/researchers-identify-rackstatic.html\n\n\ud83d\udd25 Exploits are trivial &amp; patches missing. Systems in Belgium &amp; Luxembourg already hit. Update now or go offline!", "creation_timestamp": "2025-04-25T11:00:58.000000Z"}, {"uuid": "47141fd5-e3db-4a4d-9262-342e50493810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43928", "type": "seen", "source": "https://t.me/cvedetector/23407", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43928 - Infodraw Media Relay Service File Reading Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43928 \nPublished : April 20, 2025, 3:15 a.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : In Infodraw Media Relay Service (MRS) 7.1.0.0, the MRS web server (on port 12654) allows reading arbitrary files via ../ directory traversal in the username field. Reading ServerParameters.xml may reveal administrator credentials in cleartext or with MD5 hashing. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-20T07:52:01.000000Z"}]}