{"vulnerability": "CVE-2025-46419", "sightings": [{"uuid": "391e34c8-6928-4ac9-b6ab-68a980069e16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46419", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13168", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46419\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Westermo WeOS 5 through 5.23.0 allows a reboot via a malformed ESP packet.\n\ud83d\udccf Published: 2025-04-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T00:40:54.586Z\n\ud83d\udd17 References:\n1. https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_25-02_malformed_esp_packet_could_cause_denial_vulnerability_in_weos.pdf?rev=9af5c93194f343a0b4fad2d24d032df2&amp;hash=87F4AD7F74C2BE69CA1B4C24F29B82EA", "creation_timestamp": "2025-04-24T01:04:57.000000Z"}, {"uuid": "289c1041-90c3-425d-bbce-d43af1fac2dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46419", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114390477161060154", "content": "", "creation_timestamp": "2025-04-24T02:02:42.655146Z"}, {"uuid": "6b4b20f1-8433-4dc6-a657-97f21f3202e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46419", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnjxacxewn24", "content": "", "creation_timestamp": "2025-04-24T05:15:00.445062Z"}, {"uuid": "5ba8cc8b-45e5-473e-a5d8-7fcf60aeba35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46419", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-02", "content": "", "creation_timestamp": "2025-09-18T10:00:00.000000Z"}, {"uuid": "f8b22ebf-972b-43a3-84c5-a35ca8f58e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46419", "type": "seen", "source": "https://t.me/cvedetector/23627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46419 - Westermo WeOS Reboot Remote Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-46419 \nPublished : April 24, 2025, 1:15 a.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : Westermo WeOS 5 through 5.23.0 allows a reboot via a malformed ESP packet. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T04:42:05.000000Z"}]}