{"uuid": "bae4fb30-8541-4f05-ae32-9c2c1262a67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32409\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency.\n\ud83d\udccf Published: 2025-04-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-07T21:38:56.554Z\n\ud83d\udd17 References:\n1. https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet", "creation_timestamp": "2025-04-07T21:45:57.000000Z"}