<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-16T03:24:53.967627+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ecf00849-3f29-421b-a7ab-8bfec897306a/export</id>
    <title>ecf00849-3f29-421b-a7ab-8bfec897306a</title>
    <updated>2026-05-16T03:24:54.126811+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ecf00849-3f29-421b-a7ab-8bfec897306a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29223", "type": "seen", "source": "https://t.me/cvedetector/20830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29223 - Linksys E5600 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29223 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the traceRoute function. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ecf00849-3f29-421b-a7ab-8bfec897306a/export"/>
    <published>2025-03-21T20:09:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/46687d70-7a8c-4a9e-a34d-df9203bfaaa2/export</id>
    <title>46687d70-7a8c-4a9e-a34d-df9203bfaaa2</title>
    <updated>2026-05-16T03:24:54.126723+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "46687d70-7a8c-4a9e-a34d-df9203bfaaa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29227", "type": "seen", "source": "https://t.me/cvedetector/20832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29227 - Linksys E5600 Remote Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29227 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"pkgsize\"] parameter. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/46687d70-7a8c-4a9e-a34d-df9203bfaaa2/export"/>
    <published>2025-03-21T20:09:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/64601ced-2549-4d2a-a45a-43d37d7307e6/export</id>
    <title>64601ced-2549-4d2a-a45a-43d37d7307e6</title>
    <updated>2026-05-16T03:24:54.126629+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "64601ced-2549-4d2a-a45a-43d37d7307e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29226", "type": "seen", "source": "https://t.me/cvedetector/20831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29226 - Linksys E5600 Lua Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29226 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:31.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/64601ced-2549-4d2a-a45a-43d37d7307e6/export"/>
    <published>2025-03-21T20:09:31+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/635dfa2c-8e9c-4a51-9537-3550c749dccd/export</id>
    <title>635dfa2c-8e9c-4a51-9537-3550c749dccd</title>
    <updated>2026-05-16T03:24:54.126406+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "635dfa2c-8e9c-4a51-9537-3550c749dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8655", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29226\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T12:53:41.472Z\n\ud83d\udd17 References:\n1. https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_pingTest_count/CI_pingTest_count.md", "creation_timestamp": "2025-03-25T13:24:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/635dfa2c-8e9c-4a51-9537-3550c749dccd/export"/>
    <published>2025-03-25T13:24:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b0c7e0f9-8976-464a-9365-e3e6d9408e12/export</id>
    <title>b0c7e0f9-8976-464a-9365-e3e6d9408e12</title>
    <updated>2026-05-16T03:24:54.126167+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b0c7e0f9-8976-464a-9365-e3e6d9408e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2922", "type": "seen", "source": "https://t.me/cvedetector/21467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2922 - Netis WF-2404 BusyBox Shell Cleartext Sensitive Information Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2922 \nPublished : March 28, 2025, 7:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in Netis WF-2404 1.1.124EN. Affected by this vulnerability is an unknown functionality of the component BusyBox Shell. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 2.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T21:56:23.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/b0c7e0f9-8976-464a-9365-e3e6d9408e12/export"/>
    <published>2025-03-28T21:56:23+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/2ec630d6-b387-459e-a92f-1407a40d0ded/export</id>
    <title>2ec630d6-b387-459e-a92f-1407a40d0ded</title>
    <updated>2026-05-16T03:24:54.125959+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "2ec630d6-b387-459e-a92f-1407a40d0ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115770235900335391", "content": "", "creation_timestamp": "2025-12-23T18:13:29.998407Z"}</content>
    <link href="https://db.gcve.eu/sighting/2ec630d6-b387-459e-a92f-1407a40d0ded/export"/>
    <published>2025-12-23T18:13:29.998407+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/4851607d-1c44-4ed0-bd9c-d4ad90833e3b/export</id>
    <title>4851607d-1c44-4ed0-bd9c-d4ad90833e3b</title>
    <updated>2026-05-16T03:24:54.125746+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "4851607d-1c44-4ed0-bd9c-d4ad90833e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoe37jhtk2x", "content": "", "creation_timestamp": "2025-12-23T18:14:07.294629Z"}</content>
    <link href="https://db.gcve.eu/sighting/4851607d-1c44-4ed0-bd9c-d4ad90833e3b/export"/>
    <published>2025-12-23T18:14:07.294629+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/0851a8d4-ba92-48c6-bcf6-3d11d898d5bc/export</id>
    <title>0851a8d4-ba92-48c6-bcf6-3d11d898d5bc</title>
    <updated>2026-05-16T03:24:54.125502+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0851a8d4-ba92-48c6-bcf6-3d11d898d5bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29229", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoeurwrq22y", "content": "", "creation_timestamp": "2025-12-23T18:28:24.943405Z"}</content>
    <link href="https://db.gcve.eu/sighting/0851a8d4-ba92-48c6-bcf6-3d11d898d5bc/export"/>
    <published>2025-12-23T18:28:24.943405+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/3ed1c3ee-44d6-4f1b-95c6-c738e68784ad/export</id>
    <title>3ed1c3ee-44d6-4f1b-95c6-c738e68784ad</title>
    <updated>2026-05-16T03:24:54.125212+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "3ed1c3ee-44d6-4f1b-95c6-c738e68784ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29229", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3maogwatm7u2u", "content": "", "creation_timestamp": "2025-12-23T19:05:02.044191Z"}</content>
    <link href="https://db.gcve.eu/sighting/3ed1c3ee-44d6-4f1b-95c6-c738e68784ad/export"/>
    <published>2025-12-23T19:05:02.044191+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d83b4c46-d0cf-4670-8dcb-0f01dffb9887/export</id>
    <title>d83b4c46-d0cf-4670-8dcb-0f01dffb9887</title>
    <updated>2026-05-16T03:24:54.122940+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d83b4c46-d0cf-4670-8dcb-0f01dffb9887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3maoiv3fnyl2u", "content": "", "creation_timestamp": "2025-12-23T19:40:09.916867Z"}</content>
    <link href="https://db.gcve.eu/sighting/d83b4c46-d0cf-4670-8dcb-0f01dffb9887/export"/>
    <published>2025-12-23T19:40:09.916867+00:00</published>
  </entry>
</feed>
