{"vulnerability": "CVE-2025-2923", "sightings": [{"uuid": "828fa1f4-9165-4767-9b63-5e82fd07b09d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29230", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114201698855874188", "content": "", "creation_timestamp": "2025-03-21T17:53:54.275058Z"}, {"uuid": "0f58532d-1e74-4db7-a20a-3b4199b48b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29230", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114201914352349943", "content": "", "creation_timestamp": "2025-03-21T18:48:42.180937Z"}, {"uuid": "fa6f1dd9-3d84-48bb-8230-ee36d27bfd12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29231", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115730300819190783", "content": "", "creation_timestamp": "2025-12-16T16:57:28.974102Z"}, {"uuid": "d7937ff0-19d6-4d38-8d1d-73df74e1316b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29230", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8384", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29230\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.emailReg function. The vulnerability can be triggered via the `pt[\"email\"]` parameter.\n\ud83d\udccf Published: 2025-03-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T16:23:11.583Z\n\ud83d\udd17 References:\n1. https://github.com/JZP018/Vuln/blob/main/linsys/E5600/CI_emailReg_email/CI_emailReg_email.md", "creation_timestamp": "2025-03-21T17:19:26.000000Z"}, {"uuid": "3b6dcae4-e21f-4087-b354-aa1211fd91cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2923", "type": "seen", "source": "https://t.me/cvedetector/21466", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2923 - HDF5 Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2923 \nPublished : March 28, 2025, 7:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5F_addr_encode_len of the file src/H5Fint.c. The manipulation of the argument pp leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T21:56:22.000000Z"}, {"uuid": "4c5a89c2-6979-42bd-84bb-7f3ad923dbdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29230", "type": "seen", "source": "https://t.me/cvedetector/20829", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29230 - Linksys E5600 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29230 \nPublished : March 21, 2025, 5:15 p.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.emailReg function. The vulnerability can be triggered via the `pt[\"email\"]` parameter. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T20:09:29.000000Z"}]}