{"vulnerability": "CVE-2025-4041", "sightings": [{"uuid": "79af21ca-5574-40a4-8d78-826fde081b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4041", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lop3ppnypp25", "content": "", "creation_timestamp": "2025-05-08T23:43:41.673029Z"}, {"uuid": "4f13a627-a581-4a73-ad41-9f4e7bb8f8de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4041", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114462019079175066", "content": "", "creation_timestamp": "2025-05-06T17:16:45.803494Z"}, {"uuid": "c5da99ae-a4f6-4c62-8b84-a087960161e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4041", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lojis6fc4x2n", "content": "", "creation_timestamp": "2025-05-06T18:21:46.988151Z"}, {"uuid": "855fce7d-9a00-44d7-ba0a-cae6b82e3d90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4041", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-126-01", "content": "", "creation_timestamp": "2025-05-06T10:00:00.000000Z"}, {"uuid": "7258c025-1733-4cf9-8847-03099c47a7f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4041", "type": "seen", "source": "https://t.me/cvedetector/24624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4041 - Optigo Networks ONS NC600 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-4041 \nPublished : May 6, 2025, 5:16 p.m. | 50\u00a0minutes ago \nDescription : In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:13.000000Z"}, {"uuid": "99eb78fd-774f-4c83-a7f4-2abd7a168623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4041", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15181", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4041\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions.\n\ud83d\udccf Published: 2025-05-06T16:35:18.133Z\n\ud83d\udccf Modified: 2025-05-06T17:29:11.988Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-25-126-01", "creation_timestamp": "2025-05-06T18:21:37.000000Z"}]}