{"vulnerability": "CVE-2025-41654", "sightings": [{"uuid": "ba066e8a-be22-4de2-b4d3-bbecb75cd26a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41654", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17537", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-41654\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)\n\ud83d\udd39 Description: An unauthenticated remote attacker can access information about running processes via the SNMP protocol. The amount of returned data can trigger a reboot by the watchdog.\n\ud83d\udccf Published: 2025-05-26T08:21:54.033Z\n\ud83d\udccf Modified: 2025-05-26T08:21:54.033Z\n\ud83d\udd17 References:\n1. https://cert.vde.com/en/advisories/VDE-2025-011", "creation_timestamp": "2025-05-26T08:47:32.000000Z"}, {"uuid": "77f9e10f-819b-4081-9af2-5d1feb9c2db3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-41654", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lq33usv7kae2", "content": "", "creation_timestamp": "2025-05-26T11:45:22.034082Z"}]}