<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 16 May 2026 03:24:53 +0000</lastBuildDate>
    <item>
      <title>ecf00849-3f29-421b-a7ab-8bfec897306a</title>
      <link>https://db.gcve.eu/sighting/ecf00849-3f29-421b-a7ab-8bfec897306a/export</link>
      <description>{"uuid": "ecf00849-3f29-421b-a7ab-8bfec897306a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29223", "type": "seen", "source": "https://t.me/cvedetector/20830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29223 - Linksys E5600 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29223 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the traceRoute function. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:30.000000Z"}</description>
      <content:encoded>{"uuid": "ecf00849-3f29-421b-a7ab-8bfec897306a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29223", "type": "seen", "source": "https://t.me/cvedetector/20830", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29223 - Linksys E5600 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29223 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the traceRoute function. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ecf00849-3f29-421b-a7ab-8bfec897306a/export</guid>
      <pubDate>Fri, 21 Mar 2025 20:09:30 +0000</pubDate>
    </item>
    <item>
      <title>46687d70-7a8c-4a9e-a34d-df9203bfaaa2</title>
      <link>https://db.gcve.eu/sighting/46687d70-7a8c-4a9e-a34d-df9203bfaaa2/export</link>
      <description>{"uuid": "46687d70-7a8c-4a9e-a34d-df9203bfaaa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29227", "type": "seen", "source": "https://t.me/cvedetector/20832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29227 - Linksys E5600 Remote Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29227 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"pkgsize\"] parameter. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:31.000000Z"}</description>
      <content:encoded>{"uuid": "46687d70-7a8c-4a9e-a34d-df9203bfaaa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29227", "type": "seen", "source": "https://t.me/cvedetector/20832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29227 - Linksys E5600 Remote Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29227 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"pkgsize\"] parameter. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/46687d70-7a8c-4a9e-a34d-df9203bfaaa2/export</guid>
      <pubDate>Fri, 21 Mar 2025 20:09:31 +0000</pubDate>
    </item>
    <item>
      <title>64601ced-2549-4d2a-a45a-43d37d7307e6</title>
      <link>https://db.gcve.eu/sighting/64601ced-2549-4d2a-a45a-43d37d7307e6/export</link>
      <description>{"uuid": "64601ced-2549-4d2a-a45a-43d37d7307e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29226", "type": "seen", "source": "https://t.me/cvedetector/20831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29226 - Linksys E5600 Lua Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29226 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:31.000000Z"}</description>
      <content:encoded>{"uuid": "64601ced-2549-4d2a-a45a-43d37d7307e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29226", "type": "seen", "source": "https://t.me/cvedetector/20831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29226 - Linksys E5600 Lua Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29226 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter. \nSeverity: 8.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/64601ced-2549-4d2a-a45a-43d37d7307e6/export</guid>
      <pubDate>Fri, 21 Mar 2025 20:09:31 +0000</pubDate>
    </item>
    <item>
      <title>635dfa2c-8e9c-4a51-9537-3550c749dccd</title>
      <link>https://db.gcve.eu/sighting/635dfa2c-8e9c-4a51-9537-3550c749dccd/export</link>
      <description>{"uuid": "635dfa2c-8e9c-4a51-9537-3550c749dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8655", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29226\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T12:53:41.472Z\n\ud83d\udd17 References:\n1. https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_pingTest_count/CI_pingTest_count.md", "creation_timestamp": "2025-03-25T13:24:06.000000Z"}</description>
      <content:encoded>{"uuid": "635dfa2c-8e9c-4a51-9537-3550c749dccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8655", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29226\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Linksys E5600 V1.1.0.26, the \\usr\\share\\lua\\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt[\"count\"] parameter.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T12:53:41.472Z\n\ud83d\udd17 References:\n1. https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_pingTest_count/CI_pingTest_count.md", "creation_timestamp": "2025-03-25T13:24:06.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/635dfa2c-8e9c-4a51-9537-3550c749dccd/export</guid>
      <pubDate>Tue, 25 Mar 2025 13:24:06 +0000</pubDate>
    </item>
    <item>
      <title>b0c7e0f9-8976-464a-9365-e3e6d9408e12</title>
      <link>https://db.gcve.eu/sighting/b0c7e0f9-8976-464a-9365-e3e6d9408e12/export</link>
      <description>{"uuid": "b0c7e0f9-8976-464a-9365-e3e6d9408e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2922", "type": "seen", "source": "https://t.me/cvedetector/21467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2922 - Netis WF-2404 BusyBox Shell Cleartext Sensitive Information Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2922 \nPublished : March 28, 2025, 7:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in Netis WF-2404 1.1.124EN. Affected by this vulnerability is an unknown functionality of the component BusyBox Shell. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 2.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T21:56:23.000000Z"}</description>
      <content:encoded>{"uuid": "b0c7e0f9-8976-464a-9365-e3e6d9408e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2922", "type": "seen", "source": "https://t.me/cvedetector/21467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2922 - Netis WF-2404 BusyBox Shell Cleartext Sensitive Information Storage Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2922 \nPublished : March 28, 2025, 7:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability classified as problematic was found in Netis WF-2404 1.1.124EN. Affected by this vulnerability is an unknown functionality of the component BusyBox Shell. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 2.0 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T21:56:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b0c7e0f9-8976-464a-9365-e3e6d9408e12/export</guid>
      <pubDate>Fri, 28 Mar 2025 21:56:23 +0000</pubDate>
    </item>
    <item>
      <title>2ec630d6-b387-459e-a92f-1407a40d0ded</title>
      <link>https://db.gcve.eu/sighting/2ec630d6-b387-459e-a92f-1407a40d0ded/export</link>
      <description>{"uuid": "2ec630d6-b387-459e-a92f-1407a40d0ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115770235900335391", "content": "", "creation_timestamp": "2025-12-23T18:13:29.998407Z"}</description>
      <content:encoded>{"uuid": "2ec630d6-b387-459e-a92f-1407a40d0ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115770235900335391", "content": "", "creation_timestamp": "2025-12-23T18:13:29.998407Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2ec630d6-b387-459e-a92f-1407a40d0ded/export</guid>
      <pubDate>Tue, 23 Dec 2025 18:13:29 +0000</pubDate>
    </item>
    <item>
      <title>4851607d-1c44-4ed0-bd9c-d4ad90833e3b</title>
      <link>https://db.gcve.eu/sighting/4851607d-1c44-4ed0-bd9c-d4ad90833e3b/export</link>
      <description>{"uuid": "4851607d-1c44-4ed0-bd9c-d4ad90833e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoe37jhtk2x", "content": "", "creation_timestamp": "2025-12-23T18:14:07.294629Z"}</description>
      <content:encoded>{"uuid": "4851607d-1c44-4ed0-bd9c-d4ad90833e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoe37jhtk2x", "content": "", "creation_timestamp": "2025-12-23T18:14:07.294629Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4851607d-1c44-4ed0-bd9c-d4ad90833e3b/export</guid>
      <pubDate>Tue, 23 Dec 2025 18:14:07 +0000</pubDate>
    </item>
    <item>
      <title>0851a8d4-ba92-48c6-bcf6-3d11d898d5bc</title>
      <link>https://db.gcve.eu/sighting/0851a8d4-ba92-48c6-bcf6-3d11d898d5bc/export</link>
      <description>{"uuid": "0851a8d4-ba92-48c6-bcf6-3d11d898d5bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29229", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoeurwrq22y", "content": "", "creation_timestamp": "2025-12-23T18:28:24.943405Z"}</description>
      <content:encoded>{"uuid": "0851a8d4-ba92-48c6-bcf6-3d11d898d5bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29229", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3maoeurwrq22y", "content": "", "creation_timestamp": "2025-12-23T18:28:24.943405Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0851a8d4-ba92-48c6-bcf6-3d11d898d5bc/export</guid>
      <pubDate>Tue, 23 Dec 2025 18:28:24 +0000</pubDate>
    </item>
    <item>
      <title>3ed1c3ee-44d6-4f1b-95c6-c738e68784ad</title>
      <link>https://db.gcve.eu/sighting/3ed1c3ee-44d6-4f1b-95c6-c738e68784ad/export</link>
      <description>{"uuid": "3ed1c3ee-44d6-4f1b-95c6-c738e68784ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29229", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3maogwatm7u2u", "content": "", "creation_timestamp": "2025-12-23T19:05:02.044191Z"}</description>
      <content:encoded>{"uuid": "3ed1c3ee-44d6-4f1b-95c6-c738e68784ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29229", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3maogwatm7u2u", "content": "", "creation_timestamp": "2025-12-23T19:05:02.044191Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3ed1c3ee-44d6-4f1b-95c6-c738e68784ad/export</guid>
      <pubDate>Tue, 23 Dec 2025 19:05:02 +0000</pubDate>
    </item>
    <item>
      <title>d83b4c46-d0cf-4670-8dcb-0f01dffb9887</title>
      <link>https://db.gcve.eu/sighting/d83b4c46-d0cf-4670-8dcb-0f01dffb9887/export</link>
      <description>{"uuid": "d83b4c46-d0cf-4670-8dcb-0f01dffb9887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3maoiv3fnyl2u", "content": "", "creation_timestamp": "2025-12-23T19:40:09.916867Z"}</description>
      <content:encoded>{"uuid": "d83b4c46-d0cf-4670-8dcb-0f01dffb9887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29228", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3maoiv3fnyl2u", "content": "", "creation_timestamp": "2025-12-23T19:40:09.916867Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d83b4c46-d0cf-4670-8dcb-0f01dffb9887/export</guid>
      <pubDate>Tue, 23 Dec 2025 19:40:09 +0000</pubDate>
    </item>
  </channel>
</rss>
