{"vulnerability": "CVE-2025-2906", "sightings": [{"uuid": "03dcb18f-f483-4823-9f81-5fbe230d9484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29062", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287278532930", "content": "", "creation_timestamp": "2025-04-03T17:48:24.270341Z"}, {"uuid": "9876e628-094a-43e7-bc92-00b396a9733a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29062", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287278532930", "content": "", "creation_timestamp": "2025-04-03T17:48:24.277273Z"}, {"uuid": "06196bae-6f0e-41e8-8040-266b89c8fe30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287308007306", "content": "", "creation_timestamp": "2025-04-03T17:48:24.970213Z"}, {"uuid": "4cb39428-0adb-4818-991d-cb72662ccc48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114275287308007306", "content": "", "creation_timestamp": "2025-04-03T17:48:24.973830Z"}, {"uuid": "701181e5-d8aa-4a0a-8683-809dc3c04663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29064", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llwsmehahx2w", "content": "", "creation_timestamp": "2025-04-03T21:06:29.441286Z"}, {"uuid": "4b16aa84-a3b6-43cb-8f92-2178bb357fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29062", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lluiktvujs2w", "content": "", "creation_timestamp": "2025-04-02T23:01:20.633823Z"}, {"uuid": "ff31e113-6031-49f8-acda-6b92e4c9849d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lluiku77ef2x", "content": "", "creation_timestamp": "2025-04-02T23:01:21.244828Z"}, {"uuid": "87af15f1-ff77-4f8f-a74d-137c22dabbd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lt65bo3ayz2e", "content": "", "creation_timestamp": "2025-07-04T21:02:21.362257Z"}, {"uuid": "3f63d70d-685d-42a8-9fc6-277ea04281f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-06)", "content": "", "creation_timestamp": "2025-10-06T00:00:00.000000Z"}, {"uuid": "2b1254df-e7e5-4153-bee3-04d6cee1005e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-12)", "content": "", "creation_timestamp": "2025-09-12T00:00:00.000000Z"}, {"uuid": "1a7e525d-b9e2-4265-9e0a-a83c8e92a7cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "b53e9f7e-b48d-4ca5-9325-6288165b02fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-09)", "content": "", "creation_timestamp": "2025-10-09T00:00:00.000000Z"}, {"uuid": "28986040-7196-40c6-8387-95a1ad8eb17d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-11)", "content": "", "creation_timestamp": "2025-10-11T00:00:00.000000Z"}, {"uuid": "84d0f372-bfdc-4707-a410-f8d75e9019a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-13)", "content": "", "creation_timestamp": "2026-02-13T00:00:00.000000Z"}, {"uuid": "33488e5e-67b2-491c-9116-875d1a5d1c1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-19)", "content": "", "creation_timestamp": "2025-08-19T00:00:00.000000Z"}, {"uuid": "e0a887a7-25ef-4afc-ae16-f8db09e0c5c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-01)", "content": "", "creation_timestamp": "2026-02-01T00:00:00.000000Z"}, {"uuid": "16da20cc-2d0c-43dc-81df-dfaa577bd1ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "7341eae4-f06c-4988-aedc-c8bb40081faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "d97f83da-f014-4287-a27d-57304d611a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-24)", "content": "", "creation_timestamp": "2025-09-24T00:00:00.000000Z"}, {"uuid": "c1ab7c77-2f67-45b3-a31f-c9f9348558ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-25)", "content": "", "creation_timestamp": "2026-03-25T00:00:00.000000Z"}, {"uuid": "3291a79a-57ee-44ac-ad5b-8e737d536b2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-29)", "content": "", "creation_timestamp": "2026-03-29T00:00:00.000000Z"}, {"uuid": "50db6887-cd49-46e6-b697-7b727082066e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-23)", "content": "", "creation_timestamp": "2026-03-23T00:00:00.000000Z"}, {"uuid": "3e177144-72b2-47a4-967d-2373f19991a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29064", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29064\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue in TOTOLINK x18 v.9.1.0cu.2024_B20220329 allows a remote attacker to execute arbitrary code via the sub_410E54 function of the cstecgi.cgi.\n\ud83d\udccf Published: 2025-04-03T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-07T18:36:12.254Z\n\ud83d\udd17 References:\n1. https://github.com/kn0sky/cve/blob/main/TOTOLINK%20X18/OS%20Command%20Injection%20setLanguageCfg_lang.md", "creation_timestamp": "2025-04-07T18:46:05.000000Z"}, {"uuid": "fa588f1b-6832-48a9-aaf4-d345bfc987b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-30)", "content": "", "creation_timestamp": "2026-03-30T00:00:00.000000Z"}, {"uuid": "f1f6dca8-7249-4bef-a456-c260e937108d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29069", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29069\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A heap buffer overflow vulnerability has been identified in the lcms2-2.16. The vulnerability exists in the UnrollChunkyBytes function in cmspack.c, which is responsible for handling color space transformations.\n\ud83d\udccf Published: 2025-04-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-01T20:09:32.723Z\n\ud83d\udd17 References:\n1. https://github.com/mm2/Little-CMS/issues/476", "creation_timestamp": "2025-04-01T20:33:31.000000Z"}, {"uuid": "a70845a8-f896-4e33-a7aa-cc947ec05f5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-31)", "content": "", "creation_timestamp": "2026-03-31T00:00:00.000000Z"}, {"uuid": "f2f1b3fb-3d11-43bf-9b02-bf020af534f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "17571f9e-9952-464d-869f-14987cf06aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2906", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9874", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2906\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Contempo Real Estate Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\n\ud83d\udccf Published: 2025-04-01T11:12:27.945Z\n\ud83d\udccf Modified: 2025-04-01T11:12:27.945Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/39c651c3-a478-4f58-af51-fd73d2934bdf?source=cve\n2. https://themeforest.net/item/wp-pro-real-estate-7-responsive-real-estate-wordpress-theme/12473778\n3. https://contempothemes.com/changelog/", "creation_timestamp": "2025-04-01T11:34:31.000000Z"}, {"uuid": "368fcc14-1085-4895-9e46-1f84c6d87560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2906", "type": "seen", "source": "https://t.me/cvedetector/21750", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2906 - Contempo Real Estate Core WordPress Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2906 \nPublished : April 1, 2025, 12:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : The Contempo Real Estate Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T16:23:15.000000Z"}, {"uuid": "484f7e17-7cd5-42c7-bbd1-81aadda38831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29064", "type": "seen", "source": "https://t.me/cvedetector/22022", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29064 - TOTOLINK x18 Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29064 \nPublished : April 3, 2025, 8:15 p.m. | 1\u00a0hour ago \nDescription : An issue in TOTOLINK x18 v.9.1.0cu.2024_B20220329 allows a remote attacker to execute arbitrary code via the sub_410E54 function of the cstecgi.cgi. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T23:36:21.000000Z"}, {"uuid": "4d538586-b093-4e4e-98d9-cd1a80fbb587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "https://t.me/cvedetector/21929", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29063 - BL-AC2100 Router Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29063 \nPublished : April 2, 2025, 9:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : An issue in BL-AC2100 V1.0.4 and before allows a remote attacker to execute arbitrary code via the enable parameter passed to /goform/set_hidessid_cfg is not handled properly. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T01:01:38.000000Z"}, {"uuid": "9f4db293-7b35-4730-8d7b-ea7b9c56591b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29062", "type": "seen", "source": "https://t.me/cvedetector/21928", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29062 - BL-AC2100 Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29062 \nPublished : April 2, 2025, 9:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : An issue in BL-AC2100 &lt;=v1.0.4\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T01:01:38.000000Z"}, {"uuid": "763b78e7-c287-48e1-998f-a1632b4cd6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29063", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}]}