<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T21:01:46.847497+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3c744a92-5cf5-44aa-bb97-5216e4544773/export</id>
    <title>3c744a92-5cf5-44aa-bb97-5216e4544773</title>
    <updated>2026-05-05T21:01:47.175130+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3c744a92-5cf5-44aa-bb97-5216e4544773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20213", "type": "seen", "source": "https://t.me/cvedetector/24743", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20213 - Cisco Catalyst SD-WAN Manager Local File System Overwrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20213 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.  \n  \nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3c744a92-5cf5-44aa-bb97-5216e4544773/export"/>
    <published>2025-05-07T21:31:42+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7d39bc5c-40f9-498d-9719-09850afc2467/export</id>
    <title>7d39bc5c-40f9-498d-9719-09850afc2467</title>
    <updated>2026-05-05T21:01:47.171991+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7d39bc5c-40f9-498d-9719-09850afc2467", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20213\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.\n\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user.\n\ud83d\udccf Published: 2025-05-07T17:18:23.179Z\n\ud83d\udccf Modified: 2025-05-08T03:56:27.560Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-fileoverwrite-Uc9tXWH", "creation_timestamp": "2025-05-08T04:22:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7d39bc5c-40f9-498d-9719-09850afc2467/export"/>
    <published>2025-05-08T04:22:56+00:00</published>
  </entry>
</feed>
