{"vulnerability": "CVE-2025-25220", "sightings": [{"uuid": "87f8f92f-af1c-41ef-8dc3-17ffc522b120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25220", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114182802995800818", "content": "", "creation_timestamp": "2025-03-18T09:48:26.312697Z"}, {"uuid": "b4bfc6df-8a79-42a5-a6d4-44e7183cd2a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25220", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lknn34elxy2x", "content": "", "creation_timestamp": "2025-03-18T12:08:12.046075Z"}, {"uuid": "8a176ebc-5ff0-4013-9712-7e39bde60f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25220", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "d553a080-db0e-4962-9f46-9da145537077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25220", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:29.000000Z"}, {"uuid": "8ed39e46-ad5d-485f-a838-6ba446ec3a1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25220", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7896", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25220\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.1_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker.\n\ud83d\udccf Published: 2025-03-18T08:26:13.758Z\n\ud83d\udccf Modified: 2025-03-18T08:26:13.758Z\n\ud83d\udd17 References:\n1. https://fsi-plusf.jp/news/25031701.html\n2. https://jvn.jp/en/jp/JVN11230428/", "creation_timestamp": "2025-03-18T08:57:23.000000Z"}, {"uuid": "291676db-5122-4796-896d-d570e82ef937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25220", "type": "seen", "source": "https://t.me/cvedetector/20557", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25220 - Fujitsu FS010M OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2025-25220 \nPublished : March 18, 2025, 9:15 a.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.1_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T11:53:22.000000Z"}]}