{"vulnerability": "CVE-2025-22604", "sightings": [{"uuid": "b75f417c-3b2b-4bc5-a128-0d35dc2feff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/thehackernews/6250", "content": "\u26a0\ufe0f A critical flaw (CVE-2025-22604) in Cacti could lead to remote code execution. If exploited, authenticated attackers could steal or manipulate sensitive data.\n\nPatch to version 1.2.29 to fix this flaw and protect your systems.\n\nLearn more: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html", "creation_timestamp": "2025-01-29T11:27:21.000000Z"}, {"uuid": "53793e40-3372-4ce6-a8c6-461a77a94987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/techit.bsky.social/post/3lgusv4w5jg2u", "content": "", "creation_timestamp": "2025-01-29T11:00:05.318320Z"}, {"uuid": "7e51d888-2b71-4837-b681-9870fab4d718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/ethicalhack3r.bsky.social/post/3lguszck77c2b", "content": "", "creation_timestamp": "2025-01-29T11:02:25.533391Z"}, {"uuid": "8532127a-7eec-40df-81f4-2f82a65ea0cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgut7xfqcr2y", "content": "", "creation_timestamp": "2025-01-29T11:06:08.043436Z"}, {"uuid": "dbe2e525-08c9-45a9-9576-dab187f235e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgutn47pf524", "content": "", "creation_timestamp": "2025-01-29T11:13:29.598849Z"}, {"uuid": "c28798e9-ab98-43ec-93d1-659de2f52825", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/OpenSource.activitypub.awakari.com.ap.brid.gy/post/3lgutopa24su2", "content": "", "creation_timestamp": "2025-01-29T11:16:15.483664Z"}, {"uuid": "ce169820-98c0-4710-bcc8-cbe513b7e5ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lguu4m7pf22l", "content": "", "creation_timestamp": "2025-01-29T11:22:13.275754Z"}, {"uuid": "2abbb385-b656-422e-96e3-ee158f6571e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/lordman1982.bsky.social/post/3lhgwwws65d2d", "content": "", "creation_timestamp": "2025-02-05T16:00:36.161075Z"}, {"uuid": "46c44431-06f8-40af-9096-3aee3e3913f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyemociv225", "content": "", "creation_timestamp": "2025-01-30T20:55:27.937199Z"}, {"uuid": "216eb52a-7a7b-4aa5-b511-99c223541f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyernidss25", "content": "", "creation_timestamp": "2025-01-30T20:58:18.618088Z"}, {"uuid": "e557521a-e368-484e-bfd8-14ea9d5e59e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3lgvoo3whde2h", "content": "", "creation_timestamp": "2025-01-29T19:17:14.292706Z"}, {"uuid": "532fefee-48b0-4d2f-9704-d0cd4ebbc03a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqgy6m74v2i", "content": "", "creation_timestamp": "2025-01-27T17:16:23.186692Z"}, {"uuid": "711e6071-c947-436a-ac68-b52e153aac35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/mrbyte.bsky.social/post/3lgvyd3hem22e", "content": "", "creation_timestamp": "2025-01-29T22:10:10.506671Z"}, {"uuid": "d5b3fa82-e2a8-4797-8d8a-368b6954c867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/ics_cert/1006", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0646\u0638\u0627\u0631\u062a \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062e\u0637\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0645\u0646\u0628\u0639 \u0628\u0627\u0632 Cacti \u06a9\u0634\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u06a9\u062f \u0631\u0627 \u0631\u0648\u06cc \u0646\u0645\u0648\u0646\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0646\u0627\u0645 CVE-2025-22604 \u0631\u062f\u06cc\u0627\u0628\u06cc \u0645\u06cc \u0634\u0648\u062f \u0648 \u062f\u0627\u0631\u0627\u06cc \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS 9.1 \u0627\u0632 \u062d\u062f\u0627\u06a9\u062b\u0631 10.0 \u0627\u0633\u062a \u0648 \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u0645\u062d\u0642\u0642 \u062e\u0635\u0648\u0635\u06cc \u0628\u0627 \u0646\u0627\u0645 \u0645\u0633\u062a\u0639\u0627\u0631 \u0622\u0646\u0644\u0627\u06cc\u0646 u32i \u0641\u0627\u0634 \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062a\u062c\u0632\u06cc\u0647 \u06a9\u0646\u0646\u062f\u0647 \u0646\u062a\u06cc\u062c\u0647 SNMP \u0686\u0646\u062f \u062e\u0637\u06cc \u0627\u0633\u062a \u0648 \u0628\u0627\u0639\u062b \u0645\u06cc \u0634\u0648\u062f \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0634\u062f\u0647 OID \u0647\u0627\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0631\u0627 \u062f\u0631 \u067e\u0627\u0633\u062e \u0648\u0627\u0631\u062f \u06a9\u0646\u0646\u062f.\n\n\u0647\u0646\u06af\u0627\u0645\u06cc \u06a9\u0647 \u0628\u0627 ss_net_snmp_disk_io() \u06cc\u0627 ss_net_snmp_disk_bytes() \u067e\u0631\u062f\u0627\u0632\u0634 \u0645\u06cc \u0634\u0648\u062f\u060c \u0628\u062e\u0634\u06cc \u0627\u0632 \u0647\u0631 OID \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u06cc\u06a9 \u06a9\u0644\u06cc\u062f \u062f\u0631 \u0622\u0631\u0627\u06cc\u0647 \u0627\u06cc \u06a9\u0647 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062e\u0634\u06cc \u0627\u0632 \u06cc\u06a9 \u0641\u0631\u0645\u0627\u0646 \u0633\u06cc\u0633\u062a\u0645 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f\u060c \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f \u0648 \u0645\u0646\u062c\u0631 \u0628\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631 \u0645\u06cc \u0634\u0648\u062f.\n\n\u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u0648\u0641\u0642\u06cc\u062a\u200c\u0622\u0645\u06cc\u0632 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0628\u0627 \u062d\u0642\u0648\u0642 \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u06af\u0627\u0647 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f\u060c \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0631\u0627 \u0633\u0631\u0642\u062a\u060c \u0648\u06cc\u0631\u0627\u06cc\u0634 \u06cc\u0627 \u062d\u0630\u0641 \u06a9\u0646\u062f.\n\nCVE-2025-22604 \u0628\u0631 \u062a\u0645\u0627\u0645 \u0646\u0633\u062e\u0647 \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u062a\u0627 \u0648 \u0627\u0632 \u062c\u0645\u0644\u0647 1.2.28 \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc \u06af\u0630\u0627\u0631\u062f. \u0645\u0634\u06a9\u0644 \u062f\u0631 \u0646\u0633\u062e\u0647 1.2.29 \u0628\u0631\u0637\u0631\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0646\u0633\u062e\u0647 \u062c\u062f\u06cc\u062f \u0647\u0645\u0686\u0646\u06cc\u0646 CVE-2025-24367 (CVSS: 7.2) \u0631\u0627 \u0628\u0631\u0637\u0631\u0641 \u0645\u06cc \u06a9\u0646\u062f\u060c \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u062a\u0623\u06cc\u06cc\u062f \u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0628\u0627 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u062c\u0627\u062f \u0646\u0645\u0648\u062f\u0627\u0631 \u0648 \u0639\u0645\u0644\u06a9\u0631\u062f \u0627\u0644\u06af\u0648\u06cc \u0646\u0645\u0648\u062f\u0627\u0631\u060c \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a \u0647\u0627\u06cc PHP \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u062f\u0631 \u0631\u06cc\u0634\u0647 \u0648\u0628 \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u06cc\u062c\u0627\u062f \u06a9\u0646\u062f \u0648 \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 RCE \u0627\u06cc\u062c\u0627\u062f \u0634\u0648\u062f.\n\n\u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u062a\u062c\u0631\u0628\u0647 \u0646\u0627\u062e\u0648\u0634\u0627\u06cc\u0646\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627 \u062f\u0631 Cacti\u060c \u06a9\u0633\u0627\u0646\u06cc \u06a9\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0628\u0631\u0627\u06cc \u0646\u0638\u0627\u0631\u062a \u0628\u0631 \u0634\u0628\u06a9\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u0646\u062f \u0628\u0627\u06cc\u062f \u0628\u0647 \u0633\u0631\u0639\u062a \u0648\u0635\u0644\u0647 \u0647\u0627\u06cc \u0644\u0627\u0632\u0645 \u0631\u0627 \u0628\u0631\u0627\u06cc \u06a9\u0627\u0647\u0634 \u062e\u0637\u0631 \u0633\u0627\u0632\u0634 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0646\u0646\u062f.\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-07T12:56:59.000000Z"}, {"uuid": "e7212716-903a-4675-a48d-6a128effd8b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_News/226", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution\nLink: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html", "creation_timestamp": "2025-01-29T10:48:06.000000Z"}, {"uuid": "b8eea917-0539-4227-99df-c0efb82d2f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/cibsecurity/82363", "content": "\ud83d\udd8b\ufe0f Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution \ud83d\udd8b\ufe0f\n\nA critical security flaw has been disclosed in the Cacti opensource network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE202522604, carries a CVSS score of 9.1 out of a maximum of 10.0. \"Due to a flaw in the multiline SNMP result parser, authenticated users can inject.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-01-29T14:31:19.000000Z"}, {"uuid": "33a7f600-9c34-4a28-98f8-97a74aba3b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/1533", "content": "Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution \u2013 thehackernews.com\n\nWed, 29 Jan 2025 18:21:00", "creation_timestamp": "2025-01-29T13:03:33.000000Z"}, {"uuid": "9faeb18a-86e5-4581-8e2d-95d680c3571e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "Telegram/SnpHxs1XXk4J-T3I2AOALLhhy8S2AglcplsaWCEEBmhevQ", "content": "", "creation_timestamp": "2025-01-29T12:11:37.000000Z"}, {"uuid": "cfc5c95b-aac0-461a-9a2e-cdec1923e3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "Telegram/F9apoNc9UTyyUETLpOlEKbLM2DdTcoCrk7Z65IbUMlEhyVQ", "content": "", "creation_timestamp": "2025-01-30T04:26:38.000000Z"}, {"uuid": "79cf419b-11a8-4172-967c-c7a913bfe816", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2509", "content": "CVE-2025-22604 \n(CVSS 9.1)\nRemote Code Execution Flaw in Cacti\n*\nPOC", "creation_timestamp": "2025-02-07T16:14:13.000000Z"}, {"uuid": "7f5f7dc7-9ffb-4d3f-87ee-6ba9c56e795e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/779", "content": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36\n\ncve-2025-22604\n#github #poc", "creation_timestamp": "2025-02-07T16:16:05.000000Z"}, {"uuid": "d5e62178-8007-4f86-abe8-94b2640173d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lguvyexrfq2m", "content": "", "creation_timestamp": "2025-01-29T11:55:35.295416Z"}, {"uuid": "523aacac-17d4-46a4-abcd-4b814e1708e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lgvasrrv5k22", "content": "", "creation_timestamp": "2025-01-29T15:09:19.177458Z"}, {"uuid": "cb210885-8cb8-4379-89fb-e5c0a19ab09d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgww7zkpr22n", "content": "", "creation_timestamp": "2025-01-30T07:05:11.108976Z"}, {"uuid": "677b83e4-153a-4937-ade4-f3499c2dee0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lh3hwvsifz2d", "content": "", "creation_timestamp": "2025-02-01T02:32:52.028421Z"}, {"uuid": "8697a78e-3c2d-4be0-b7da-32dd7a56eb39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/CyberBulletin/2202", "content": "\u26a1Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2025-01-29T13:14:35.000000Z"}, {"uuid": "9a3c6ec1-f6a8-4958-a13a-efd9f506191b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113901810192356434", "content": "", "creation_timestamp": "2025-01-27T18:48:17.053712Z"}, {"uuid": "e20ceae2-6745-4112-947b-5ac218fbf2c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lh7nvnkpq62e", "content": "", "creation_timestamp": "2025-02-02T18:30:10.948341Z"}, {"uuid": "b8f1c3c6-f709-460a-b106-544cdc621250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lguscw6bjh24", "content": "", "creation_timestamp": "2025-01-29T10:49:53.795233Z"}, {"uuid": "4fb42c8d-062a-48b8-a54e-76eecfe02913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html", "content": "", "creation_timestamp": "2025-01-29T09:21:00.000000Z"}, {"uuid": "e69885a3-bdc4-4248-be5e-48e32934dc38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/113912448887880931", "content": "", "creation_timestamp": "2025-01-29T15:53:49.519103Z"}, {"uuid": "fbdc6b4a-3dff-457c-a435-e9fe3b36d3fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://threatintel.cc/2025/01/29/critical-cacti-security-flaw-cve.html", "content": "", "creation_timestamp": "2025-01-29T11:19:08.000000Z"}, {"uuid": "26742c8b-30fb-4594-a293-50175b6b17ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgxckchjss2f", "content": "", "creation_timestamp": "2025-01-30T10:45:49.559975Z"}, {"uuid": "5c08d2d0-00aa-4f1d-a860-2132df43e57e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-22604", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgubidfvc22n", "content": "", "creation_timestamp": "2025-01-29T05:48:41.917347Z"}, {"uuid": "11e38811-72d0-4229-86c5-264ffa817666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgsoamsic422", "content": "", "creation_timestamp": "2025-01-28T14:31:45.220981Z"}, {"uuid": "8b9fe60c-e822-417e-85bf-11c1f9418acc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/cvedetector/16498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22604 - \"Cacti SNMP Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-22604 \nPublished : Jan. 27, 2025, 5:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:32.000000Z"}, {"uuid": "b29f3fa3-8a79-4c2d-adab-792d3e34c4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/7698", "content": "Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution \u2013 thehackernews.com\n\nWed, 29 Jan 2025 18:21:00", "creation_timestamp": "2025-01-29T13:03:33.000000Z"}, {"uuid": "3f8dd80b-1ee2-4d03-a489-3abc40adb7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "Telegram/GNrdmoXGCQ375jwLJrUoj89-c5tJbyGJMa5WfNNrhtSu7UI", "content": "", "creation_timestamp": "2025-01-29T13:03:30.000000Z"}, {"uuid": "1b3dc912-5b98-43f4-8fe4-190ab68eaa80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/true_secator/6679", "content": "\u0412 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0438 \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c Cacti \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u0445.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2025-22604 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,1 \u0438\u0437 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0445 10,0, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u043f\u043e\u0434 \u0441\u0435\u0442\u0435\u0432\u044b\u043c \u043f\u0441\u0435\u0432\u0434\u043e\u043d\u0438\u043c\u043e\u043c u32i.\n\n\u041e\u043d\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0440\u043e\u0447\u043d\u044b\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u043c \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u0432 SNMP \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0432 \u043e\u0442\u0432\u0435\u0442 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 OID.\n\n\u041f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e ss_net_snmp_disk_io() \u0438\u043b\u0438 ss_net_snmp_disk_bytes() \u0447\u0430\u0441\u0442\u044c \u043a\u0430\u0436\u0434\u043e\u0433\u043e OID \u0431\u0443\u0434\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043a\u043b\u044e\u0447\u0430 \u0432 \u043c\u0430\u0441\u0441\u0438\u0432\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0447\u0430\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0443\u043a\u0440\u0430\u0441\u0442\u044c, \u043e\u0442\u0440\u0435\u0434\u0430\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435.\n\nCVE-2025-22604 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 1.2.28 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 1.2.29. \n\n\u0412 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 CVE-2025-24367\u00a0(CVSS: 7,2), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 PHP-\u0441\u043a\u0440\u0438\u043f\u0442\u044b \u0432 \u043a\u043e\u0440\u043d\u0435\u0432\u043e\u043c \u0432\u0435\u0431-\u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u043e\u0432 \u0438 \u0448\u0430\u0431\u043b\u043e\u043d\u043e\u0432 \u0433\u0440\u0430\u0444\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a RCE.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u043e\u043f\u044b\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Cacti, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u043c \u044d\u0442\u043e \u041f\u041e \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0438, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043d\u0430\u043a\u0430\u0442\u0438\u0442\u044c \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0440\u0438\u0441\u043a \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2025-01-30T18:04:04.000000Z"}, {"uuid": "5034de04-cceb-4394-ad60-f6e832573ed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22604", "type": "seen", "source": "https://t.me/ctinow/230054", "content": "Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution\nhttps://ift.tt/LYvoCMZ", "creation_timestamp": "2025-01-29T11:54:16.000000Z"}]}