{"vulnerability": "CVE-2025-20055", "sightings": [{"uuid": "02aa0257-4acd-4fac-bca8-e04e4151f418", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lftcbdn4ym2r", "content": "", "creation_timestamp": "2025-01-16T03:04:50.349903Z"}, {"uuid": "ebac3080-2586-440e-b047-942053fc0e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826039821462233", "content": "", "creation_timestamp": "2025-01-14T09:38:51.966879Z"}, {"uuid": "d10f01a1-2be7-4b14-a931-1ac43ef89250", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfozfpjhlb2n", "content": "", "creation_timestamp": "2025-01-14T10:15:33.669326Z"}, {"uuid": "af3ef409-7315-4a6e-ab41-170e3fd76684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37nvmgs2r", "content": "", "creation_timestamp": "2025-01-14T10:47:57.738008Z"}, {"uuid": "150184e8-8915-49a8-bb77-96138762245e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113826312906279825", "content": "", "creation_timestamp": "2025-01-14T10:48:19.307919Z"}, {"uuid": "185be716-f1a8-4324-bd4c-6ac18952f796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37okv422r", "content": "", "creation_timestamp": "2025-01-14T10:47:59.871535Z"}, {"uuid": "fdee4fe3-98f7-4d2d-9f31-b627a84dd4a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lftmioxemc2o", "content": "", "creation_timestamp": "2025-01-16T06:07:57.907583Z"}, {"uuid": "949e4b6f-28c1-4ea9-8888-1e5b2c6f1787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfzjiqttbz2y", "content": "", "creation_timestamp": "2025-01-18T14:30:13.782481Z"}, {"uuid": "5b62addb-f08e-4f10-820e-2d60d7b9181d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1471", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20055\n\ud83d\udd39 Description: OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command.\n\ud83d\udccf Published: 2025-01-14T09:33:46.428Z\n\ud83d\udccf Modified: 2025-01-14T09:33:46.428Z\n\ud83d\udd17 References:\n1. https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/\n2. https://jvn.jp/en/vu/JVNVU99653331/", "creation_timestamp": "2025-01-14T10:21:55.000000Z"}, {"uuid": "1df19410-7677-44f0-afe8-7ff7f7373efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20055", "type": "seen", "source": "https://t.me/cvedetector/15242", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-20055 - \"Y'S STEALTHONE D220/D340 Command Injection\"\", \n  \"Content\": \"CVE ID : CVE-2025-20055 \nPublished : Jan. 14, 2025, 10:15 a.m. | 39\u00a0minutes ago \nDescription : OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T12:18:59.000000Z"}]}