CVE-2025-63208

An issue was discovered in bridgetech VB288 Objective QoE Content Extractor, firmware version 5.6.0-8, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:bridgetech:vb288_firmware:5.6.0-8:*:*:*:*:*:*:*
cpe:2.3:h:bridgetech:vb288:-:*:*:*:*:*:*:*

History

15 Jan 2026, 21:52

Type Values Removed Values Added
References () https://bridgetech.tv/ - () https://bridgetech.tv/ - Product
References () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63208_bridgetech%20VB288%20Information%20Disclosure - () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63208_bridgetech%20VB288%20Information%20Disclosure - Exploit, Third Party Advisory
First Time Bridgetech vb288 Firmware
Bridgetech
Bridgetech vb288
CPE cpe:2.3:h:bridgetech:vb288:-:*:*:*:*:*:*:*
cpe:2.3:o:bridgetech:vb288_firmware:5.6.0-8:*:*:*:*:*:*:*

20 Nov 2025, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-312

19 Nov 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-19 18:15

Updated : 2026-01-15 21:52


NVD link : CVE-2025-63208

Mitre link : CVE-2025-63208

CVE.ORG link : CVE-2025-63208


JSON object : View

Products Affected

bridgetech

  • vb288_firmware
  • vb288
CWE
CWE-312

Cleartext Storage of Sensitive Information