{"vulnerability": "CVE-2025-2963", "sightings": [{"uuid": "755c784c-1921-42d5-a772-2c14e77160e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll7q2zfffq2j", "content": "", "creation_timestamp": "2025-03-25T16:49:44.557202Z"}, {"uuid": "0b214095-51c0-41cf-9f09-471e9f9656e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29632", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqdcfscg3un2", "content": "", "creation_timestamp": "2025-05-29T18:02:24.870573Z"}, {"uuid": "5daf19c3-ae87-4268-9177-5eeeabccd4a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://gist.github.com/stone776/62caf070c1c841dbb439acee42f962a2", "content": "", "creation_timestamp": "2026-04-25T08:28:28.000000Z"}, {"uuid": "38836db3-42a0-4049-b361-b45f679d6026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29631", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-03", "content": "", "creation_timestamp": "2026-02-24T11:00:00.000000Z"}, {"uuid": "5d710fb2-184a-49db-882c-9c7f98d99d86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "exploited", "source": "https://t.me/BleepingComputer/24518", "content": "\u200aNew Mirai campaign exploits RCE flaw in EoL D-Link routers\n\nA new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet. [...]\n\nhttps://www.bleepingcomputer.com/news/security/new-mirai-campaign-exploits-rce-flaw-in-eol-d-link-routers/", "creation_timestamp": "2026-04-22T20:16:21.000000Z"}, {"uuid": "d687d5b1-4b71-493d-a835-6c6d547c2bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "exploited", "source": "https://t.me/ctinow/249198", "content": "Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers\nhttps://ift.tt/fD7Le5k", "creation_timestamp": "2026-04-22T18:04:27.000000Z"}, {"uuid": "591edccb-4156-4807-a4c3-1f8eb7b696e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116460864002205112", "content": "", "creation_timestamp": "2026-04-24T17:29:19.051142Z"}, {"uuid": "9a814a15-b6bf-4152-a0fd-aa818c219403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mk44vdcb7624", "content": "", "creation_timestamp": "2026-04-22T18:29:34.718552Z"}, {"uuid": "66a86efb-8733-4ef9-aa04-72f4f8f2fca4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3mk45tuketq27", "content": "", "creation_timestamp": "2026-04-22T18:46:39.126116Z"}, {"uuid": "44df19ed-96a1-4c2c-8dd3-fbdbdb2e3d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3mk4ca4xuiz2l", "content": "", "creation_timestamp": "2026-04-22T20:05:05.716051Z"}, {"uuid": "98b86aad-7d49-4e95-93bc-446ae5a4375c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mk4fgt2shf2g", "content": "", "creation_timestamp": "2026-04-22T21:02:32.693052Z"}, {"uuid": "3a22fe84-1689-402a-b8df-1446d8bfa4a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mk4htdnv6d2x", "content": "", "creation_timestamp": "2026-04-22T21:45:18.915371Z"}, {"uuid": "4315c353-aca4-4ba2-95fa-ac98b928d641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mk4nny6jky24", "content": "", "creation_timestamp": "2026-04-22T23:29:41.246831Z"}, {"uuid": "3b691cda-2225-4194-bb49-0a3487b2b2ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mk4pf43qdo2u", "content": "", "creation_timestamp": "2026-04-23T00:00:31.119595Z"}, {"uuid": "439ae2cf-12cf-4a40-9606-e776c90cb5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3mk5d2p7vvk2d", "content": "", "creation_timestamp": "2026-04-23T05:52:39.519657Z"}, {"uuid": "373c6040-3583-4927-aa3c-5f11c77f806a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29635", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3mk5eogpfv22w", "content": "", "creation_timestamp": "2026-04-23T06:21:32.415969Z"}, {"uuid": "f6126f43-a42f-48db-a096-2f92f14d0df3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mk6kqhf6ss2d", "content": "", "creation_timestamp": "2026-04-23T17:42:42.368574Z"}, {"uuid": "4e15a064-bcab-4981-b780-2b6345cb2323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116460946332281703", "content": "", "creation_timestamp": "2026-04-24T17:50:15.178049Z"}, {"uuid": "f8c71c32-6a31-4779-b899-49bf6890e646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mk6womi3ok2d", "content": "", "creation_timestamp": "2026-04-23T21:16:26.050470Z"}, {"uuid": "b6d31a2a-e54b-438c-a5c3-27fa95191611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mkb3npe6wg27", "content": "", "creation_timestamp": "2026-04-24T17:50:43.073230Z"}, {"uuid": "7cbf7320-49cd-45c3-86e5-a15e885675ab", "vulnerability_lookup_origin": "405284c2-e461-4670-8979-7fd2c9755a60", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-29635", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1bcb64f7-0cf2-44a0-9e0e-c0cf67742404", "content": "", "creation_timestamp": "2026-04-24T18:00:01.887431Z"}, {"uuid": "25535be0-d91a-4458-a9e3-95645b736b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/6334753", "content": "", "creation_timestamp": "2026-04-24T19:38:38.814244Z"}, {"uuid": "63088775-ea56-4a0b-9531-b2cde874cc4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mk7iw463ccrs", "content": "", "creation_timestamp": "2026-04-24T02:43:01.928738Z"}, {"uuid": "28053d07-cd55-4ab8-874b-96d504153df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29635", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mka2u3nqukrs", "content": "", "creation_timestamp": "2026-04-24T08:04:03.063912Z"}, {"uuid": "78acbf9a-533d-42ed-90b0-7601c99e326b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/116453675237302014", "content": "", "creation_timestamp": "2026-04-23T11:01:06.714166Z"}, {"uuid": "509ee871-8154-4b37-bf70-d4b866e56ddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29631", "type": "seen", "source": "https://t.me/GithubRedTeam/78481", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a ICSA-26-055-03\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a MichaelAdamGroberman\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-02 15:58:52\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCISA Advisory ICSA-26-055-03 (Update A) \u2014 Gardyn Home Kit IoT Vulnerabilities \u2014 10 CVEs (CVE-2025-1242, CVE-2025-10681, CVE-2025-29628, CVE-2025-29629, CVE-2025-29631, CVE-2026-28766, CVE-2026-25197, CVE-2026-32646, CVE-2026-28767, CVE-2026-32662)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-02T16:00:04.000000Z"}, {"uuid": "6290cab9-053e-44a0-a322-f2d1fb94b060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2963", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9557", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2963\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as problematic, has been found in ConcreteCMS up to 9.3.9. This issue affects the function addEditQuestion of the component Legacy Form Block Handler. The manipulation of the argument Question leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-30T22:00:12.181Z\n\ud83d\udccf Modified: 2025-03-30T22:00:12.181Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302015\n2. https://vuldb.com/?ctiid.302015\n3. https://vuldb.com/?submit.522413\n4. https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc1.md", "creation_timestamp": "2025-03-30T22:31:07.000000Z"}, {"uuid": "b8383176-82fa-4989-92ef-31aaba199cb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mkiwjvrbw223", "content": "", "creation_timestamp": "2026-04-27T20:40:28.288429Z"}, {"uuid": "f2d5dee7-5424-4902-96a5-a8b9f22db1b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8651", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29635\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.\n\ud83d\udccf Published: 2025-03-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-25T13:03:40.937Z\n\ud83d\udd17 References:\n1. https://github.com/mono7s/Dir-823x/blob/main/set_prohibiting/set_prohibiting.md", "creation_timestamp": "2025-03-25T13:23:59.000000Z"}, {"uuid": "51e289a4-62c5-4e54-b7f0-0c6ec57dd8c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mkdwuk7fub2g", "content": "", "creation_timestamp": "2026-04-25T21:03:11.947456Z"}, {"uuid": "5e6e52ae-90b8-4791-90e4-138c353c4fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "exploited", "source": "Telegram/47EgD6HRFdjL8lSrN_oseytw7Re77bEJzRFd7eCT8rFsEpNY", "content": "", "creation_timestamp": "2026-04-22T18:10:04.000000Z"}, {"uuid": "786be539-928e-4455-b8de-606bd0252bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mklqqlpops2w", "content": "", "creation_timestamp": "2026-04-28T23:34:46.745915Z"}, {"uuid": "cc0611e5-3448-4948-a77d-a1ea2365e5e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2963", "type": "seen", "source": "https://t.me/cvedetector/21523", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2963 - ConcreteCMS Legacy Form Block Handler Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2963 \nPublished : March 30, 2025, 10:15 p.m. | 24\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, has been found in ConcreteCMS up to 9.3.9. This issue affects the function addEditQuestion of the component Legacy Form Block Handler. The manipulation of the argument Question leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T00:47:00.000000Z"}, {"uuid": "322b0149-76df-4eb8-b6fa-b4f7b3a06e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29630", "type": "published-proof-of-concept", "source": "Telegram/OollRHxvoptfGlV2c1gbdC6jSDWMy1y9qQszI5U7KKS9Kqc", "content": "", "creation_timestamp": "2025-07-04T21:00:04.000000Z"}, {"uuid": "ba9eef42-267a-41e3-94e7-43a56cc261f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29631", "type": "published-proof-of-concept", "source": "Telegram/OollRHxvoptfGlV2c1gbdC6jSDWMy1y9qQszI5U7KKS9Kqc", "content": "", "creation_timestamp": "2025-07-04T21:00:04.000000Z"}, {"uuid": "200d0061-b033-4cf1-8106-2b3f285925c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29632", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/38507", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1athe information for the vulnerability covered by CVE-2025-29632\nURL\uff1ahttps://github.com/OHnogood/CVE-2025-29632\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-29T06:29:36.000000Z"}, {"uuid": "275a78f8-a958-4684-89ed-9177688c020e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "seen", "source": "https://t.me/cvedetector/21109", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29635 - D-Link DIR-823X Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29635 \nPublished : March 25, 2025, 2:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T17:49:20.000000Z"}, {"uuid": "1b72d544-07ea-4849-83ca-e0663b402b8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29635", "type": "published-proof-of-concept", "source": "Telegram/4yRTt9dy-kSa9hw9IvAX8xqiMQA60h8go96Ck2HC1in5CKw", "content": "", "creation_timestamp": "2025-03-25T17:30:48.000000Z"}, {"uuid": "b3defa14-7500-459d-89b2-f2609cc443eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29635", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/116499431109566275", "content": "Mirai Turns Unsupported D-Link Routers into DDoS Weapons Using CVE-2025-29635#CVE_2025_29635 #Mirai https://www.secpod.com/blog/mirai-turns-unsupported-d-link-routers-into-ddos-weapons-using-cve-2025-29635/", "creation_timestamp": "2026-05-01T12:57:28.740903Z"}]}