{"vulnerability": "CVE-2025-4733", "sightings": [{"uuid": "74ffb43f-97ec-4873-9ed0-7850c7ad526f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4733", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpaypfq2m524", "content": "", "creation_timestamp": "2025-05-16T02:37:46.110905Z"}, {"uuid": "47edd6c5-fe2a-4b2d-a26f-c61335ceb172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47337", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbs7u2ndcu2g", "content": "", "creation_timestamp": "2026-01-07T00:34:22.068059Z"}, {"uuid": "4082c4fe-efa8-44b5-b05c-6ea4d0648306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47335", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbsad42d6o2x", "content": "", "creation_timestamp": "2026-01-07T00:42:46.838459Z"}, {"uuid": "73f12d6d-01dc-4fd0-ac4c-f3e840b91f06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47333", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbsagosuyb2m", "content": "", "creation_timestamp": "2026-01-07T00:44:47.397778Z"}, {"uuid": "45864a50-6edb-4e3c-a7da-8c437569b03f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47339", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbsakjreqp2r", "content": "", "creation_timestamp": "2026-01-07T00:46:56.251071Z"}, {"uuid": "1a4d74ad-3c88-42ab-978d-97908a602f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47332", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbsat5jbg62q", "content": "", "creation_timestamp": "2026-01-07T00:51:45.221483Z"}, {"uuid": "0cbc7136-5f51-4bfe-8be5-dda7e3b10ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47336", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbsaxzumdd2y", "content": "", "creation_timestamp": "2026-01-07T00:54:29.424895Z"}, {"uuid": "ebf2512c-e100-4074-b186-c23227989334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47334", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbscdo4pzv2o", "content": "", "creation_timestamp": "2026-01-07T01:18:53.416490Z"}, {"uuid": "ec18437a-0526-4eef-b881-6afb6d2d3510", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47339", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/115852613280042209", "content": "", "creation_timestamp": "2026-01-07T07:23:08.823500Z"}, {"uuid": "31db505d-daac-4162-9b5f-d8ab39c6ce4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47339", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mbtukz4e5w22", "content": "", "creation_timestamp": "2026-01-07T16:17:47.191523Z"}, {"uuid": "55af8bf4-2ce4-4c6d-af90-cce3321dc2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4733", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16593", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4733\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation of the argument mac leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-16T00:31:09.060Z\n\ud83d\udccf Modified: 2025-05-16T00:31:09.060Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309035\n2. https://vuldb.com/?ctiid.309035\n3. https://vuldb.com/?submit.570703\n4. https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/7.md\n5. https://www.totolink.net/", "creation_timestamp": "2025-05-16T01:34:20.000000Z"}]}