<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 23:12:41 +0000</lastBuildDate>
    <item>
      <title>3c744a92-5cf5-44aa-bb97-5216e4544773</title>
      <link>https://vulnerability.circl.lu/sighting/3c744a92-5cf5-44aa-bb97-5216e4544773/export</link>
      <description>{"uuid": "3c744a92-5cf5-44aa-bb97-5216e4544773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20213", "type": "seen", "source": "https://t.me/cvedetector/24743", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20213 - Cisco Catalyst SD-WAN Manager Local File System Overwrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20213 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.  \n  \nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:42.000000Z"}</description>
      <content:encoded>{"uuid": "3c744a92-5cf5-44aa-bb97-5216e4544773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20213", "type": "seen", "source": "https://t.me/cvedetector/24743", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20213 - Cisco Catalyst SD-WAN Manager Local File System Overwrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-20213 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.  \n  \nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3c744a92-5cf5-44aa-bb97-5216e4544773/export</guid>
      <pubDate>Wed, 07 May 2025 21:31:42 +0000</pubDate>
    </item>
    <item>
      <title>7d39bc5c-40f9-498d-9719-09850afc2467</title>
      <link>https://vulnerability.circl.lu/sighting/7d39bc5c-40f9-498d-9719-09850afc2467/export</link>
      <description>{"uuid": "7d39bc5c-40f9-498d-9719-09850afc2467", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20213\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.\n\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user.\n\ud83d\udccf Published: 2025-05-07T17:18:23.179Z\n\ud83d\udccf Modified: 2025-05-08T03:56:27.560Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-fileoverwrite-Uc9tXWH", "creation_timestamp": "2025-05-08T04:22:56.000000Z"}</description>
      <content:encoded>{"uuid": "7d39bc5c-40f9-498d-9719-09850afc2467", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20213", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15470", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20213\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system.\n\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user.\n\ud83d\udccf Published: 2025-05-07T17:18:23.179Z\n\ud83d\udccf Modified: 2025-05-08T03:56:27.560Z\n\ud83d\udd17 References:\n1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-fileoverwrite-Uc9tXWH", "creation_timestamp": "2025-05-08T04:22:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7d39bc5c-40f9-498d-9719-09850afc2467/export</guid>
      <pubDate>Thu, 08 May 2025 04:22:56 +0000</pubDate>
    </item>
  </channel>
</rss>
