{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-8515","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-04T05:41:27.160Z","datePublished":"2025-08-04T10:32:05.124Z","dateUpdated":"2025-10-29T06:53:04.612Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-29T06:53:04.612Z"},"title":"Intelbras InControl JSON Endpoint operador information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"Information Disclosure"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"Intelbras","product":"InControl","versions":[{"version":"2.21.60.9","status":"affected"}],"modules":["JSON Endpoint"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in Intelbras InControl 2.21.60.9. This vulnerability affects unknown code of the file /v1/operador/ of the component JSON Endpoint. Executing manipulation can lead to information disclosure. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be exploited. Upgrading the affected component is advised."},{"lang":"de","value":"Es wurde eine Schwachstelle in Intelbras InControl 2.21.60.9 entdeckt. Davon betroffen ist unbekannter Code der Datei /v1/operador/ der Komponente JSON Endpoint. Dank Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Ein Angriff erfordert eine vergleichsweise hohe Komplexität. Sie gilt als schwierig ausnutzbar. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden. Es wird empfohlen, die betroffene Komponente zu aktualisieren."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":3.1,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.1,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.1,"vectorString":"AV:N/AC:H/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-08-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-29T07:57:56.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lorenzomoulin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.318641","name":"VDB-318641 | Intelbras InControl JSON Endpoint operador information disclosure","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.318641","name":"VDB-318641 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.579544","name":"Submit #579544 | Intelbras InControl  2.21.60.9 Information Disclosure","tags":["third-party-advisory"]},{"url":"https://backend.intelbras.com/sites/default/files/2025-08/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.60%20e%202.21.61%20PT-IN%20.pdf","tags":["related"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-04T14:30:06.568840Z","id":"CVE-2025-8515","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-04T15:00:05.698Z"}}]}}