{"uuid": "1f556361-e34d-4480-917b-127aeccacf15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32102", "type": "exploited", "source": "https://t.me/jj_8tl/408", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/OkzA9zFYq2\n\n\ud83d\udea8\ud83d\udea8CrushFTP Under Attack! \nCVE-2025-32102: SSRF alert! Attackers can exploit weak host/port validation to hijack requests.\nCVE-2025-32103: Directory traversal flaw exposes remote files to unauthorized access.  \n\ud83d\udd25PoC: https://t.co/ZUcRl7qA7m\n\nZoomEye Dork\ud83d\udc49app=\"CrushFTP\"\nReveals 71k+ vulnerable instances!  \nZoomEye Link: https://t.co/KBmxsCTUFo\nSHODAN Dork\ud83d\udc49server: CrushFTP HTTP Server\n\nRefer: https://t.co/5PLZhC5A6c\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-15T03:57:35.000000Z"}