{"vulnerability": "CVE-2025-5484", "sightings": [{"uuid": "4ddb0ebc-12f9-4e2f-873d-75522d626df5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5484", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18222", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5484\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: A username and password are required to authenticate to the central \nSinoTrack device management interface. The username for all devices is \nan identifier printed on the receiver. The default password is \nwell-known and common to all devices. Modification of the default \npassword is not enforced during device setup. A malicious actor can \nretrieve device identifiers with either physical access or by capturing \nidentifiers from pictures of the devices posted on publicly accessible \nwebsites such as eBay.\n\ud83d\udccf Published: 2025-06-12T20:03:32.255Z\n\ud83d\udccf Modified: 2025-06-12T20:16:45.707Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-160-01\n2. https://www.sinotrackgps.com/help-center", "creation_timestamp": "2025-06-12T20:34:14.000000Z"}, {"uuid": "9f9030e3-2d58-41f6-9004-1d600b511406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5484", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-160-01", "content": "", "creation_timestamp": "2025-06-10T10:00:00.000000Z"}, {"uuid": "6c86448d-8cae-44ac-8af8-7baf08e4be73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5484", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrgsbpb3uu2p", "content": "", "creation_timestamp": "2025-06-12T20:49:06.176349Z"}, {"uuid": "0d592474-f2dd-4932-827b-39c43ff2ca04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54846", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lvcwx7mrr62e", "content": "", "creation_timestamp": "2025-08-01T05:42:48.881777Z"}, {"uuid": "a8a879ed-cb84-49d8-bef3-331e486d4c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54848", "type": "seen", "source": "https://infosec.place/objects/9bae9001-fe80-4b23-8400-f0e5eaf86f0e", "content": "", "creation_timestamp": "2025-12-01T15:30:51.636580Z"}, {"uuid": "b387979e-c7a2-47ff-b011-2593b2d0c906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5484", "type": "seen", "source": "https://bsky.app/profile/cybersecurity.page/post/3lrelivve5x2o", "content": "", "creation_timestamp": "2025-06-11T23:42:30.490726Z"}, {"uuid": "c7f8254c-7050-4f13-afb6-765d8643307e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54849", "type": "seen", "source": "https://infosec.place/objects/9bae9001-fe80-4b23-8400-f0e5eaf86f0e", "content": "", "creation_timestamp": "2025-12-01T15:30:51.769426Z"}]}