{"vulnerability": "CVE-2025-4851", "sightings": [{"uuid": "e29baac5-31af-46f2-ac19-383b8f63b881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4851", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpg7xlniggg2", "content": "", "creation_timestamp": "2025-05-18T04:32:29.767653Z"}, {"uuid": "9f119361-4bfd-4695-aa7e-294d52b7aa3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4851", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpgc2co3r32w", "content": "", "creation_timestamp": "2025-05-18T05:08:16.275810Z"}, {"uuid": "c3d964e8-d091-4210-b6de-ad6e92baa857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48510", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6fsspo2552s", "content": "", "creation_timestamp": "2025-11-24T21:53:26.547121Z"}, {"uuid": "25b0a52e-97df-4845-b623-9aced0ffce6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48511", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6ft3o3rt32a", "content": "", "creation_timestamp": "2025-11-24T21:58:26.977556Z"}, {"uuid": "876e5094-66bb-4e6b-87e9-e118cf93ba8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-48514", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "6a1cd396-31ae-4410-a6cc-89a0e7ee95a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4851", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16851", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4851\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in TOTOLINK N300RH 6.1c.1390_B20191101. This vulnerability affects the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-18T03:31:05.521Z\n\ud83d\udccf Modified: 2025-05-19T14:28:55.806Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309322\n2. https://vuldb.com/?ctiid.309322\n3. https://vuldb.com/?submit.575074\n4. https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/m3.md\n5. https://www.totolink.net/", "creation_timestamp": "2025-05-19T14:38:36.000000Z"}]}