{"uuid": "d98c7074-a732-47e6-90ea-56b0a60f54c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32433", "type": "exploited", "source": "https://t.me/thehackernews/6682", "content": "\ud83d\udea8 CVSS 10.0 ALERT: Remote Code Execution in Erlang/OTP SSH (CVE-2025-32433)\n\nNo auth. Full control. Widespread impact.\n\nUsed in Cisco, Ericsson, OT/IoT, and edge systems, this bug lets attackers run code without logging in.\n\nIf SSH runs as root? Game over. \ud83d\udc40\n\n\ud83d\udd17 Full details \u2192 https://thehackernews.com/2025/04/critical-erlangotp-ssh-vulnerability.html\n\n\ud83d\udd25 Fix now \u2192 OTP-27.3.3 / 26.2.5.11 / 25.3.2.20  Block SSH ports as temp fix.", "creation_timestamp": "2025-04-17T11:35:00.000000Z"}