{"vulnerability": "CVE-2025-32821", "sightings": [{"uuid": "e3c438ae-291a-42b9-8a3e-199545e37618", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114484031428334108", "content": "", "creation_timestamp": "2025-05-10T14:34:50.833653Z"}, {"uuid": "6576d1bc-6f26-4e64-bbc5-b02d862e005f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32821\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance.\n\ud83d\udccf Published: 2025-05-07T17:22:14.812Z\n\ud83d\udccf Modified: 2025-05-07T18:53:45.238Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011", "creation_timestamp": "2025-05-07T19:22:25.000000Z"}, {"uuid": "4e6b963d-6f3d-4131-9fff-dc8c670282d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114467788999930682", "content": "", "creation_timestamp": "2025-05-07T17:44:07.566170Z"}, {"uuid": "374d1d1c-18c2-489c-9dd2-9468db1b97d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomgxttmno2o", "content": "", "creation_timestamp": "2025-05-07T22:27:07.230265Z"}, {"uuid": "59eb3c35-5d3c-49da-bca3-256da378f02d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3loqsptl2ji2r", "content": "", "creation_timestamp": "2025-05-09T16:08:02.458800Z"}, {"uuid": "e88f6f6e-7ef7-4560-ba54-6a753051179b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lorleeqgyk25", "content": "", "creation_timestamp": "2025-05-09T23:29:01.569606Z"}, {"uuid": "0fa9d814-3564-422b-8f24-0f5df833d0c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://t.me/cvedetector/24741", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32821 - SMA100 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32821 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:40.000000Z"}, {"uuid": "1a465af5-542e-44d9-9a9a-80bd303fe3b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/114472133423896093", "content": "", "creation_timestamp": "2025-05-08T12:08:58.025802Z"}, {"uuid": "ebbf5347-444b-40f2-adda-c470eddcd49e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3lonuvo7ixc2h", "content": "", "creation_timestamp": "2025-05-08T12:09:06.502191Z"}, {"uuid": "f746f162-1158-43a4-81e3-724d3476f9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0145", "content": "", "creation_timestamp": "2025-05-08T06:40:26.000000Z"}, {"uuid": "adce0d6e-152c-420d-a4ef-f4534890d5a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32821", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3loxr4af7ac2n", "content": "", "creation_timestamp": "2025-05-12T10:27:49.700007Z"}]}