{"uuid": "68926cf3-ed57-49f9-b8fe-9db9d3f48ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31324", "type": "exploited", "source": "https://t.me/cybersecplayground/187", "content": "\ud83d\udea8 Security Alert \ud83d\udea8\nCVE-2025-31324 (CVSS v3 Score: 10.0) \u2014 Critical SAP NetWeaver Zero-Day Vulnerability\n\n\ud83d\udd34 A critical Zero-Day vulnerability has been discovered affecting SAP NetWeaver platforms.\nAttackers are actively exploiting this flaw, leading to severe risks of remote code execution, privilege escalation, and full system compromise!\n\n\ud83d\udd25 PoC / Exploit Details:\n\u27a1\ufe0f ReliaQuest Threat Spotlight\n\n\ud83d\udd25 Nuclei Template:\n\u27a1\ufe0f Github\n\n\ud83d\udd0e Hunter Dork:\nproduct.name=\"SAP NetWeaver\"\n\ud83d\udc49 Hunter Link\n\n\ud83d\udcf0 More References:\nBleepingComputer\n\n\u26a0\ufe0fStay alert! Organizations using SAP must patch immediately and audit exposed instances to avoid major breaches.\n\nFollow @cybersecplayground for the latest CVE alerts, exploits, and cybersecurity news! \ud83d\ude80\n\ud83d\udd01 Like and Share to spread awareness!\n\n#SAP #hunterhow #infosec #infosecurity #OSINT #Vulnerability", "creation_timestamp": "2025-04-28T19:47:27.000000Z"}