{"vulnerability": "CVE-2025-4142", "sightings": [{"uuid": "63a0b762-d806-4722-a07b-907a9adbb695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41423", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnkenuxsgc2s", "content": "", "creation_timestamp": "2025-04-24T09:15:16.221669Z"}, {"uuid": "2269708a-5277-46c1-9d8c-be4d70a6a8f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41428", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqoxsyn3oet2", "content": "", "creation_timestamp": "2025-06-03T09:27:50.739595Z"}, {"uuid": "464293a2-9366-45ea-bb31-35046328d6f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41427", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsdi2eowjj2o", "content": "", "creation_timestamp": "2025-06-24T06:33:13.330611Z"}, {"uuid": "91ab1091-5371-4180-a5e7-20b712e92003", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4142", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114427554904223230", "content": "", "creation_timestamp": "2025-04-30T15:12:03.599456Z"}, {"uuid": "497717bd-1685-43ae-ba52-c241600cd318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4142", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114429585881047884", "content": "", "creation_timestamp": "2025-04-30T23:48:34.230884Z"}, {"uuid": "88763357-99ce-4c01-b9e3-3c5cfe074337", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4142", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo37f5426j2w", "content": "", "creation_timestamp": "2025-05-01T01:56:09.801547Z"}, {"uuid": "d78517ea-8a71-4714-91a1-2b20a46eb9c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41428", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqpdej6pr32m", "content": "", "creation_timestamp": "2025-06-03T12:50:58.588618Z"}, {"uuid": "d31cf8fc-1a4f-450f-ac43-99e3437d1a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-10", "content": "", "creation_timestamp": "2025-05-20T10:00:00.000000Z"}, {"uuid": "b3adcd6f-fe0f-4901-a225-67d76f7671c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41429", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpnmwf7x6k24", "content": "", "creation_timestamp": "2025-05-21T03:11:31.501016Z"}, {"uuid": "06a0f1c7-ff8b-42ed-80ad-a895d5ccac88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lpoxtdwhvk26", "content": "", "creation_timestamp": "2025-05-21T15:59:20.358236Z"}, {"uuid": "b8c37c0e-51ee-49e7-920f-0b047b33a497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lpoxtdwsnc26", "content": "", "creation_timestamp": "2025-05-21T15:59:20.967795Z"}, {"uuid": "fe896172-629b-4f91-bc40-09c56b04c8a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41425", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-203-01", "content": "", "creation_timestamp": "2025-07-22T10:00:00.000000Z"}, {"uuid": "46c031f6-e2c5-46d9-b56c-cf862c074b26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41425", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luls7nrweg2j", "content": "", "creation_timestamp": "2025-07-23T00:46:49.350578Z"}, {"uuid": "1f011b9d-230a-4e89-84ab-9e5ab98f4e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41420", "type": "seen", "source": "https://infosec.place/objects/9e8fca1b-b68f-4eeb-acef-1e8f38f32db1", "content": "", "creation_timestamp": "2025-07-24T15:30:28.715879Z"}, {"uuid": "fac713f9-742e-4d45-854c-23b2f37c5c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41429", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16818", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41429\n\ud83d\udd25 CVSS Score: 4.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: a-blog cms multiple versions neutralize logs improperly. If this vulnerability is exploited with CVE-2025-36560, a remote unauthenticated attacker may hijack a legitimate user's session.\n\ud83d\udccf Published: 2025-05-19T08:07:38.068Z\n\ud83d\udccf Modified: 2025-05-19T08:07:38.068Z\n\ud83d\udd17 References:\n1. https://developer.a-blogcms.jp/blog/news/JVNVU-90760614.html\n2. https://jvn.jp/en/vu/JVNVU90760614/", "creation_timestamp": "2025-05-19T08:38:18.000000Z"}, {"uuid": "3e193e0b-0ebe-48f5-9877-cae88ec87c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41427", "type": "seen", "source": "Telegram/U2NCrjFaUt9bKnx7p-SuklJbEiIwayTgmv0yP2ZPyo5eTfc", "content": "", "creation_timestamp": "2025-06-24T05:32:37.000000Z"}, {"uuid": "892158f7-e300-49b6-bbe3-549793bb6163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lppn2mguue2j", "content": "", "creation_timestamp": "2025-05-21T22:19:12.215301Z"}, {"uuid": "9e41fa11-669b-4be3-a5f1-a3b5abc9ab78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41429", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpjnlrec2r2t", "content": "", "creation_timestamp": "2025-05-19T13:12:49.273960Z"}, {"uuid": "1ed48f71-d8ea-44af-afa4-a4e5976ef31f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4142", "type": "seen", "source": "https://t.me/cvedetector/24163", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4142 - Netgear EX6200 Remote Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4142 \nPublished : April 30, 2025, 11:16 p.m. | 51\u00a0minutes ago \nDescription : A vulnerability has been found in Netgear EX6200 1.0.3.94 and classified as critical. This vulnerability affects the function sub_3C8EC. The manipulation of the argument host leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T02:17:21.000000Z"}, {"uuid": "172f52b9-e2aa-4461-8708-a00c93ccf778", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4142", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14191", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4142\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in Netgear EX6200 1.0.3.94 and classified as critical. This vulnerability affects the function sub_3C8EC. The manipulation of the argument host leads to buffer overflow. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-04-30T22:31:04.284Z\n\ud83d\udccf Modified: 2025-04-30T22:31:04.284Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306634\n2. https://vuldb.com/?ctiid.306634\n3. https://vuldb.com/?submit.560790\n4. https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_ex6200/Buffer_overflow-sub_3C8EC-gui_Wireless_Security_state/README.md\n5. https://www.netgear.com/", "creation_timestamp": "2025-04-30T23:14:30.000000Z"}, {"uuid": "0a9c60c4-a286-4b5c-bf74-7c4ca9a723a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41426", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41426\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Affected Vertiv products contain a stack based buffer overflow vulnerability. An attacker could exploit this vulnerability to gain code execution on the device.\n\ud83d\udccf Published: 2025-05-21T19:22:29.596Z\n\ud83d\udccf Modified: 2025-05-21T19:22:29.596Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-10\n2. https://www.vertiv.com/en-us/support/security-support-center/", "creation_timestamp": "2025-05-21T19:42:48.000000Z"}, {"uuid": "5fedc943-77b8-4208-8e0b-a1bce228bf30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41427", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19314", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41427\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: WRC-X3000GS, WRC-X3000GSA, and WRC-X3000GSN contain an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in Connection Diagnostics page. If a remote authenticated attacker sends a specially crafted request to the affected product, an arbitrary OS command may be executed.\n\ud83d\udccf Published: 2025-06-24T04:37:09.818Z\n\ud83d\udccf Modified: 2025-06-24T04:37:09.818Z\n\ud83d\udd17 References:\n1. https://www.elecom.co.jp/news/security/20250624-01/\n2. https://jvn.jp/en/jp/JVN39435597/", "creation_timestamp": "2025-06-24T05:49:05.000000Z"}, {"uuid": "2001e0bd-bcc2-4ad3-ac7e-5bb7c5f64cb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41423", "type": "seen", "source": "https://t.me/cvedetector/23650", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-41423 - Mattermost Playbooks API Permission Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-41423 \nPublished : April 24, 2025, 7:15 a.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : Mattermost versions 10.4.x &lt;=&lt;=&lt;=\nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T11:23:20.000000Z"}, {"uuid": "3f93a60a-e8f1-4ddd-9a77-19b8d7af2141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41429", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpj6iw6o5vo2", "content": "", "creation_timestamp": "2025-05-19T08:43:35.686305Z"}]}