{"vulnerability": "CVE-2025-6521", "sightings": [{"uuid": "8842041e-3ddd-403e-9037-93a8ccd66965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-65212", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbrk7ofwfi2e", "content": "", "creation_timestamp": "2026-01-06T18:07:10.031516Z"}, {"uuid": "d2168633-29d3-41cf-beec-aa9ad135acbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6521", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-177-02", "content": "", "creation_timestamp": "2025-06-26T10:00:00.000000Z"}, {"uuid": "9ad9514e-2396-43ed-bc80-d2ccf3886b55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-65213", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115727377585460199", "content": "", "creation_timestamp": "2025-12-16T04:34:04.696631Z"}, {"uuid": "8fd6474f-d87b-451d-b3f7-863bbff202ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6521", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lsjwd5nqsj2a", "content": "", "creation_timestamp": "2025-06-26T20:04:38.879903Z"}, {"uuid": "3e315287-ffd7-406d-a4a2-889738446345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-65212", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mbrlnklw2e2a", "content": "", "creation_timestamp": "2026-01-06T18:32:49.609453Z"}, {"uuid": "860d300c-91d0-4118-9fa1-c135d27cab81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6521", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19756", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6521\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N)\n\ud83d\udd39 Description: During the initial setup of the device the user connects to an access \npoint broadcast by the Sight Bulb Pro. During the negotiation, AES \nEncryption keys are passed in cleartext. If captured, an attacker may be\n able to decrypt communications between the management app and the Sight\n Bulb Pro which may include sensitive information such as network \ncredentials.\n\ud83d\udccf Published: 2025-06-27T17:06:55.087Z\n\ud83d\udccf Modified: 2025-06-27T17:29:48.416Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-177-02\n2. https://www.trendmakerscares.com/Customer-Service-Hours", "creation_timestamp": "2025-06-27T17:56:11.000000Z"}]}