{"vulnerability": "CVE-2025-32409", "sightings": [{"uuid": "bae4fb30-8541-4f05-ae32-9c2c1262a67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32409\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency.\n\ud83d\udccf Published: 2025-04-07T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-07T21:38:56.554Z\n\ud83d\udd17 References:\n1. https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet", "creation_timestamp": "2025-04-07T21:45:57.000000Z"}, {"uuid": "19b2be65-7158-4802-b3b0-ba1851b0474e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114299352397344855", "content": "", "creation_timestamp": "2025-04-07T23:48:29.524720Z"}, {"uuid": "b5dd857a-556b-424d-b7e3-a5d537ec2747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "seen", "source": "Telegram/t0F4y_WS-Izge_sRAx1w26KxSWN5Dvu_48e4NjYxre7mHKNLRA", "content": "", "creation_timestamp": "2025-10-28T23:31:05.000000Z"}, {"uuid": "8c6aeb6c-1ebf-48c9-a4a3-a91d434cead9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "published-proof-of-concept", "source": "Telegram/W2TWdoWrUKNmmhGmSV3_goOutk_L4s3sBFcvx9KhQrX6568", "content": "", "creation_timestamp": "2025-04-08T00:30:35.000000Z"}, {"uuid": "7a5a643f-d078-4c9e-98be-4a9dd1035b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32409", "type": "seen", "source": "https://t.me/cvedetector/22357", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32409 - Ratta SuperNote A6 X2 Nomad Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32409 \nPublished : April 7, 2025, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T01:26:26.000000Z"}]}