{"vulnerability": "cve-2025-2002", "sightings": [{"uuid": "19c9c16a-8261-4356-90c5-e1ec7dcfbe9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113953196776332903", "content": "", "creation_timestamp": "2025-02-05T20:36:33.074843Z"}, {"uuid": "c125103c-cea7-4312-8cb4-75d6e43e4191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhljgossz27", "content": "", "creation_timestamp": "2025-02-05T22:08:53.702011Z"}, {"uuid": "dbcd5551-4a57-4c87-8541-5d472471778e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952492462136812", "content": "", "creation_timestamp": "2025-02-05T17:37:26.201887Z"}, {"uuid": "46e783cf-0253-47a2-b547-ee1bc6e35611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh6jyudev2h", "content": "", "creation_timestamp": "2025-02-05T18:16:31.371808Z"}, {"uuid": "da4a5066-5009-4fde-bbde-a161aadd5c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113952771259642555", "content": "", "creation_timestamp": "2025-02-05T18:48:34.026514Z"}, {"uuid": "022c55cb-a4a8-4e1d-a359-09acbaeddaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lj5b53hxly2m", "content": "", "creation_timestamp": "2025-02-27T06:26:46.251864Z"}, {"uuid": "55deb8cb-2c5d-4f0c-a8db-326100c8b443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-20029", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lj5iu6k7zk2w", "content": "", "creation_timestamp": "2025-02-27T08:44:56.569744Z"}, {"uuid": "8736ec8f-dd4f-4dae-aba2-b8b5646153e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lj4x5p4koc2k", "content": "", "creation_timestamp": "2025-02-27T03:28:12.222230Z"}, {"uuid": "cdbd972d-69c3-4d78-8456-ddc155c3e517", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2002", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-077-04", "content": "", "creation_timestamp": "2025-03-18T11:00:00.000000Z"}, {"uuid": "12b047b2-ae4a-419a-9ea5-54d970fe7e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljqdjoicut2c", "content": "", "creation_timestamp": "2025-03-06T20:30:10.895649Z"}, {"uuid": "7d139268-4319-4359-89f3-31d2972aa64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "affa1b8b-2806-4c43-8f26-2afa2ac4c544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lj6lviv7kk2m", "content": "", "creation_timestamp": "2025-02-27T19:12:05.183314Z"}, {"uuid": "5249626b-0339-4963-8f7a-4ac99a00cdde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20021", "type": "seen", "source": "MISP/e1f6260f-3311-441b-92ae-e04cd5eb5f72", "content": "", "creation_timestamp": "2025-08-19T13:26:45.000000Z"}, {"uuid": "0165f89c-d6b8-4080-a013-b520a17b89ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:45.000000Z"}, {"uuid": "42ab1942-5324-42a6-aec6-da5e520d35ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/35132", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSimulated environment for CVE-2025-20029 using Docker. Includes PoC and auto-reporting.\nURL\uff1ahttps://github.com/schoi1337/CVE-2025-20029-simulation\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-01T06:00:25.000000Z"}, {"uuid": "545cc74c-9858-4ee2-ae36-b722c64f82f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/15093", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP\nURL\uff1ahttps://github.com/mbadanoiu/CVE-2025-20029\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-23T19:02:21.000000Z"}, {"uuid": "f855f456-97a1-4783-bfec-6cc4e097af76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5456", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20029\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\ud83d\udccf Published: 2025-02-05T17:31:06.455Z\n\ud83d\udccf Modified: 2025-02-26T04:55:26.913Z\n\ud83d\udd17 References:\n1. https://my.f5.com/manage/s/article/K000148587", "creation_timestamp": "2025-02-26T05:26:38.000000Z"}, {"uuid": "6ba2ae48-18d2-400e-bef8-ac170ac9f6e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2002", "type": "seen", "source": "https://t.me/cvedetector/20151", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2002 - Fortinet FTP Server Sensitive Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2002 \nPublished : March 12, 2025, 4:15 p.m. | 2\u00a0hours, 58\u00a0minutes ago \nDescription : CWE-532: Insertion of Sensitive Information into Log Files vulnerability exists that could cause the disclosure  \nof FTP server credentials when the FTP server is deployed, and the device is placed in debug mode by an  \nadministrative user and the debug files are exported from the device. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T20:23:01.000000Z"}, {"uuid": "f839ecc1-836d-405b-a882-11ecdf787cd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/2419", "content": "\u26a1CVE-2025-20029: Command Injection Flaw Discovered in F5 BIG-IP System, PoC Releases.\n\n#CyberBulletin", "creation_timestamp": "2025-02-28T04:57:07.000000Z"}, {"uuid": "b068e8ff-9fab-413e-8ac6-e1db0375c8dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "Telegram/iKE-ifN8C4jbKlxJZm9dPRBcrWriwuOpiCrJGZ4kRda8BQ8", "content": "", "creation_timestamp": "2025-02-24T04:00:07.000000Z"}, {"uuid": "2ad4a3f6-6a07-44e0-8920-f75e5ff628e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2585", "content": "#exploit\n1. CVE-2025-20029:\nCommand Injection in TMSH CLI in F5 BIG-IP\nhttps://github.com/mbadanoiu/CVE-2025-20029\n\n2. Dropping a 0 day:\nParallels Desktop Repack Root Privilege Escalation (CVE-2024-34331)\nhttps://jhftss.github.io/Parallels-0-day\n\n3. CVE-2025-21669/CVE-2025-21670:\nvsock/virtio: discard packets if the transport changes / vsock/bpf: return early if transport is not assigned (Linux Kernel)\nhttps://u1f383.github.io/linux/2025/02/24/linux-kernel-some-vsock-vulnerabilities-analysis.html", "creation_timestamp": "2025-02-28T07:48:31.000000Z"}, {"uuid": "0a1c2613-b40a-40eb-8fd0-665d9e5dfddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "Telegram/Z0ari8MHZAzBUd7K9yxhwtBySsURYEVG61pidF9swyP9zTE", "content": "", "creation_timestamp": "2025-05-01T13:00:06.000000Z"}, {"uuid": "f74019b6-8509-4095-804e-ee0b2f299f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11859", "content": "#exploit\n1. CVE-2025-20029:\nCommand Injection in TMSH CLI in F5 BIG-IP\nhttps://github.com/mbadanoiu/CVE-2025-20029\n\n2. Dropping a 0 day:\nParallels Desktop Repack Root Privilege Escalation (CVE-2024-34331)\nhttps://jhftss.github.io/Parallels-0-day\n\n3. CVE-2025-21669/CVE-2025-21670:\nvsock/virtio: discard packets if the transport changes / vsock/bpf: return early if transport is not assigned (Linux Kernel)\nhttps://u1f383.github.io/linux/2025/02/24/linux-kernel-some-vsock-vulnerabilities-analysis.html", "creation_timestamp": "2025-02-26T00:08:02.000000Z"}]}