{"vulnerability": "cve-2025-4139", "sightings": [{"uuid": "f2e5c849-f9e8-4715-9e36-8a2c010b2252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41399", "type": "seen", "source": "https://t.me/cvedetector/24767", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-41399 - F5 BIG-IP SCTP Profile Memory Exhaustion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-41399 \nPublished : May 7, 2025, 10:15 p.m. | 29\u00a0minutes ago \nDescription : When a Stream Control Transmission Protocol (SCTP) profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T00:52:39.000000Z"}, {"uuid": "e6ec5981-494e-497e-a290-ce1c7d6ff72a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4139", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114429113294159822", "content": "", "creation_timestamp": "2025-04-30T21:48:23.681993Z"}, {"uuid": "3b17e703-76c9-48b1-963d-7347851bb739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4139", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo2rxiezrq2p", "content": "", "creation_timestamp": "2025-04-30T21:55:52.257618Z"}, {"uuid": "d2729ad7-9fa8-4966-acd2-2dc426dea8be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41393", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loxrwdpuhp2p", "content": "", "creation_timestamp": "2025-05-12T10:42:24.194208Z"}, {"uuid": "3117b149-7064-40e5-9b59-13500a11cf49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41390", "type": "seen", "source": "https://infosec.exchange/users/BugBountyShorts/statuses/115407218186203260", "content": "", "creation_timestamp": "2025-10-20T15:33:19.259972Z"}, {"uuid": "da7581d3-1547-4486-863a-3693f70fc1ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41392", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01", "content": "", "creation_timestamp": "2025-08-12T10:00:00.000000Z"}, {"uuid": "e3136e1b-58e8-4614-b321-1f90676fa8b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4139", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14166", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4139\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in Netgear EX6120 1.0.0.68. Affected by this vulnerability is the function fwAcosCgiInbound. The manipulation of the argument host leads to buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-04-30T20:31:04.150Z\n\ud83d\udccf Modified: 2025-04-30T20:35:31.481Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306631\n2. https://vuldb.com/?ctiid.306631\n3. https://vuldb.com/?submit.560785\n4. https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_ex6120/Buffer_overflow-fwAcosCgiInbound-port_end/README.md\n5. https://www.netgear.com/", "creation_timestamp": "2025-04-30T21:15:29.000000Z"}, {"uuid": "7970e3c6-22e9-46bd-b23e-2f3a5609ab41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41395", "type": "seen", "source": "https://t.me/cvedetector/23649", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-41395 - Mattermost Denial of Service (DoS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-41395 \nPublished : April 24, 2025, 7:15 a.m. | 1\u00a0hour, 15\u00a0minutes ago \nDescription : Mattermost versions 10.4.x &lt;=&lt;=&lt;=\nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T11:23:20.000000Z"}, {"uuid": "6d6742d7-d006-4c30-9739-fee88338940d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41393", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-41393.yaml", "content": "", "creation_timestamp": "2025-05-19T16:18:51.000000Z"}, {"uuid": "8b1f5ce3-53da-4de2-8230-45c22530a4c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41392", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lwpnsecp3n26", "content": "", "creation_timestamp": "2025-08-19T00:28:50.251057Z"}, {"uuid": "1325ad9b-c110-4d3c-9fac-48869aa13cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41393", "type": "seen", "source": "https://t.me/cvedetector/25072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-41393 - Ricoh Web Image Monitor Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-41393 \nPublished : May 12, 2025, 8:15 a.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : Reflected cross-site scripting vulnerability exists in the laser printers and MFPs (multifunction printers) which implement Ricoh Web Image Monitor. If exploited, an arbitrary script may be executed on the web browser of the user who accessed Web Image Monitor. As for the details of affected product names and versions, refer to the information provided by the vendor under [References]. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T12:46:01.000000Z"}, {"uuid": "3a71407b-9c89-4b96-a14d-ec9a38a91450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4139", "type": "seen", "source": "https://t.me/cvedetector/24150", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4139 - Netgear EX6120 Remote Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4139 \nPublished : April 30, 2025, 9:15 p.m. | 48\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in Netgear EX6120 1.0.0.68. Affected by this vulnerability is the function fwAcosCgiInbound. The manipulation of the argument host leads to buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T00:36:48.000000Z"}, {"uuid": "a97bae54-f1aa-4230-806e-6717f7e8d1ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41395", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnkenujqhk2u", "content": "", "creation_timestamp": "2025-04-24T09:15:14.039237Z"}, {"uuid": "50f9f0ca-f228-4d5d-87e7-d75340f3a5aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41399", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomnonzw4r2n", "content": "", "creation_timestamp": "2025-05-08T00:27:18.741238Z"}, {"uuid": "27a0d523-42d1-461e-862d-7dac1fdf9db1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41393", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lpmyc6nv5z2n", "content": "", "creation_timestamp": "2025-05-20T21:02:23.856366Z"}, {"uuid": "248aad8a-f416-4a63-89c0-4e9f17fbcd1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41390", "type": "seen", "source": "https://infosec.place/objects/3ced0945-759a-4785-ae71-b8288fa9ac5a", "content": "", "creation_timestamp": "2025-10-20T14:30:04.982110Z"}, {"uuid": "8259600c-0fc1-4b35-b351-bd27c0e999b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41390", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3n4rwle2t2h", "content": "", "creation_timestamp": "2025-10-20T15:25:01.232433Z"}, {"uuid": "6dd0e151-165c-41c7-9bbc-bc66e9891ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41390", "type": "seen", "source": "https://infosec.exchange/users/BugBountyShorts/statuses/115416779409759748", "content": "", "creation_timestamp": "2025-10-22T08:04:52.292147Z"}, {"uuid": "50e024a3-9099-49d0-8899-8a6b3e2ebbfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-41399", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15453", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41399\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: When a Stream Control Transmission Protocol (SCTP) profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization.\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\ud83d\udccf Published: 2025-05-07T22:04:07.220Z\n\ud83d\udccf Modified: 2025-05-07T22:04:07.220Z\n\ud83d\udd17 References:\n1. https://my.f5.com/manage/s/article/K000137709", "creation_timestamp": "2025-05-07T22:23:13.000000Z"}]}