{"vulnerability": "CVE-2025-2071", "sightings": [{"uuid": "5183f3de-4ed4-4096-b7e4-99a12f72cd6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114256223207317838", "content": "", "creation_timestamp": "2025-03-31T09:00:09.371470Z"}, {"uuid": "0d459446-c8a0-415a-b85b-a8bda9f63280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114256223207317838", "content": "", "creation_timestamp": "2025-03-31T09:00:09.376127Z"}, {"uuid": "1411a62f-c254-4228-a5c2-93c30a3001b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llo2ukyrmd24", "content": "", "creation_timestamp": "2025-03-31T09:40:15.961927Z"}, {"uuid": "0fa41868-24db-4c9f-b73d-7fa2b8c8f1a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-2071", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114257817910722783", "content": "", "creation_timestamp": "2025-03-31T15:45:43.715732Z"}, {"uuid": "8034f547-f011-4817-8c6f-03bb7f0d50f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3llopc5lzgc2g", "content": "", "creation_timestamp": "2025-03-31T15:45:49.159513Z"}, {"uuid": "0c4412e1-c922-408a-85b2-56c509c8b9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-2071", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114257817910722783", "content": "", "creation_timestamp": "2025-03-31T15:45:43.717730Z"}, {"uuid": "be844b1c-4727-4d19-a112-43dcc71a5254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:47:56.000000Z"}, {"uuid": "27ecf76e-997e-403d-95e7-7ce0a191912e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20719", "type": "seen", "source": "https://gist.github.com/Darkcrai86/aeaa61eb7be585f7778744c1d3a6c6b3", "content": "", "creation_timestamp": "2025-10-14T13:27:50.000000Z"}, {"uuid": "6b894896-9597-4cce-a503-4d52fa91c540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20710", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:49.933105Z"}, {"uuid": "5490219d-444d-4309-8c55-2a3906f21173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20711", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.044660Z"}, {"uuid": "302006fb-292a-420c-af1c-14653c6f3c79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20712", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.150818Z"}, {"uuid": "45c6a54f-a8b9-4081-a8a5-9b51807428d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20713", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.258862Z"}, {"uuid": "1f787877-2eee-4883-b446-816fab6c3b40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20714", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.365679Z"}, {"uuid": "8d2438a0-8c4b-4687-b816-32915c3ca100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20715", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.472820Z"}, {"uuid": "e9962dd3-8d90-4242-a7e0-1cf241a34c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20716", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.577684Z"}, {"uuid": "4e6f09ac-69f5-480c-ab8d-8c2c83116be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20717", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.693572Z"}, {"uuid": "e35bed4f-6427-4ce8-a8a7-494b7e004c04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20718", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.795467Z"}, {"uuid": "fd73a44f-f594-4881-a234-31cdaadcfdcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20719", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115372817715516192", "content": "", "creation_timestamp": "2025-10-14T13:44:50.896666Z"}, {"uuid": "627aebf5-7910-4cb5-a088-1fa7ad654eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:44.000000Z"}, {"uuid": "b6471fa1-91aa-4019-8eaf-36cfbd7ed66b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9622", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2071\n\ud83d\udd25 CVSS Score: 10 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:N/RE:M/U:Amber)\n\ud83d\udd39 Description: A critical OS Command Injection vulnerability has been identified in the FAST LTA Silent Brick WebUI, allowing remote attackers to execute arbitrary operating system commands via specially crafted input. This vulnerability arises due to improper handling of untrusted input, which is passed directly to system-level commands without adequate sanitization or validation. Successful exploitation could allow attackers to execute arbitrary commands on the affected system, potentially resulting in unauthorized access, data leakage, or full system compromise. Affected WebUI parameters are \"hd\" and \"pi\".\n\ud83d\udccf Published: 2025-03-31T08:33:53.271Z\n\ud83d\udccf Modified: 2025-03-31T08:33:53.271Z\n\ud83d\udd17 References:\n1. https://www.fast-lta.de/de/fast/silent-bricks-software-2-63", "creation_timestamp": "2025-03-31T09:31:10.000000Z"}, {"uuid": "088d2e40-c0fd-4fc6-b2cc-22ee3a4d9640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20711", "type": "seen", "source": "Telegram/2W7IPlTREd6XXcsNLDQ6ulBdLx770nVFwDpgw_spoyi56ck", "content": "", "creation_timestamp": "2026-01-13T07:00:21.000000Z"}, {"uuid": "5980f363-24af-41a0-a4ba-e9eb0b529ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://t.me/DarkWebInformer_News/2627", "content": "\ud83d\udea8 News Alert!\n\nSource: Dark Web Informer - Cyber Threat Intelligence\nTitle: CVE-2025-2071: OS Command Injection Vulnerability in FAST LTA Silent Brick WebUI\nLink: https://darkwebinformer.com/cve-2025-2071-os-command-injection-vulnerability-in-fast-lta-silent-brick-webui/", "creation_timestamp": "2025-03-31T15:46:32.000000Z"}, {"uuid": "b887a8d2-fb73-46e4-9fb8-8ebd834c738a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://t.me/cvedetector/21577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2071 - \"FAST LTA Silent Brick WebUI OS Command Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2071 \nPublished : March 31, 2025, 9:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : A critical OS Command Injection vulnerability has been identified in the FAST LTA Silent Brick WebUI, allowing remote attackers to execute arbitrary operating system commands via specially crafted input. This vulnerability arises due to improper handling of untrusted input, which is passed directly to system-level commands without adequate sanitization or validation. Successful exploitation could allow attackers to execute arbitrary commands on the affected system, potentially resulting in unauthorized access, data leakage, or full system compromise. Affected WebUI parameters are \"hd\" and \"pi\". \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T13:20:24.000000Z"}, {"uuid": "f3442d2d-d69b-4b2f-8ed4-6c0f345c4824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/15563", "content": "\ud83d\udea8CVE-2025-2071: OS Command Injection Vulnerability in FAST LTA Silent Brick WebUI\n\nCVSS: 10\n\nhttps://darkwebinformer.com/cve-2025-2071-os-command-injection-vulnerability-in-fast-lta-silent-brick-webui/", "creation_timestamp": "2025-03-31T17:45:34.000000Z"}, {"uuid": "e7f38165-4c26-498e-8d75-0cae3ad0f0ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2071", "type": "seen", "source": "https://t.me/CyberBulletin/2870", "content": "\u26a1CVE-2025-2071: OS Command Injection Vulnerability in FAST LTA Silent Brick WebUI.\n\n#CyberBulletin", "creation_timestamp": "2025-04-01T02:41:25.000000Z"}]}