{"vulnerability": "CVE-2025-6129", "sightings": [{"uuid": "4defbd2d-2417-471a-8140-997f606e8de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61299", "type": "published-proof-of-concept", "source": "Telegram/rxBXc7mJGGU5sBhvwkQkmojEU4Xu_3I8--yJupvnllAH1D4", "content": "", "creation_timestamp": "2025-11-07T09:00:04.000000Z"}, {"uuid": "761e4cd5-69cc-4352-abc9-7a03a1a0afb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6129", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114693979502813612", "content": "", "creation_timestamp": "2025-06-16T16:27:20.799388Z"}, {"uuid": "7c575334-f2b8-483a-9577-50d91105d340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6129", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrqp3bck662k", "content": "", "creation_timestamp": "2025-06-16T19:18:24.537082Z"}, {"uuid": "960b65a7-7c62-4830-8a25-46ae550aeb79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-61299", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/58649", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAuthenticated  Command Injection in Nagios XI 2024R1 (CVE-2025-61299)\nURL\uff1ahttps://github.com/GovindPalakkal/CVE-2025-61299_POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-11-07T05:43:37.000000Z"}, {"uuid": "852212a8-7694-42ec-ba3b-5b7e29224248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6129", "type": "seen", "source": "Telegram/oLQjAXwI1pcf9b6pBxZ_Mz6ST3ZRfB0R6VH0O2pbpfBI_60", "content": "", "creation_timestamp": "2025-06-16T16:33:33.000000Z"}, {"uuid": "a5221bc1-00fb-4da3-a91a-4094cff1bfb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-6129", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6129\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formSaveConfig of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-06-16T16:00:14.890Z\n\ud83d\udccf Modified: 2025-06-16T16:00:14.890Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.312598\n2. https://vuldb.com/?ctiid.312598\n3. https://vuldb.com/?submit.592695\n4. https://github.com/byxs0x0/cve2/blob/main/9.md\n5. https://github.com/byxs0x0/cve2/blob/main/9.md#poc\n6. https://www.totolink.net/", "creation_timestamp": "2025-06-16T16:36:03.000000Z"}]}