{"vulnerability": "CVE-2025-54424", "sightings": [{"uuid": "58008d90-2296-4869-a8e8-448069804830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "Telegram/C3dLOex4qKF8CrF74Ro2jk8I9HmXrLWpS6IVMSsoWA8-ZJQ", "content": "", "creation_timestamp": "2025-08-04T21:00:05.000000Z"}, {"uuid": "f7bfeeb6-81f8-45f8-ad2d-dc73201356df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lveye43e2s2z", "content": "", "creation_timestamp": "2025-08-02T01:13:14.396240Z"}, {"uuid": "094a2cf3-8f81-4e10-9153-b4e85cf89d5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lvpmrt4aq22t", "content": "", "creation_timestamp": "2025-08-06T06:45:28.929532Z"}, {"uuid": "96d643c5-6627-45df-a56f-a6a07e00d4fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "seen", "source": "https://bsky.app/profile/g0rosato.bsky.social/post/3lwbnstdckm2v", "content": "", "creation_timestamp": "2025-08-13T10:51:51.162649Z"}, {"uuid": "a8115fb9-cc2e-4559-8efd-416a519f63f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "seen", "source": "https://bsky.app/profile/bilaltariq01.bsky.social/post/3lvnfeankix2p", "content": "", "creation_timestamp": "2025-08-05T09:27:17.227384Z"}, {"uuid": "c5c817b0-0027-473f-bfa8-831d36027de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvr4obl46322", "content": "", "creation_timestamp": "2025-08-06T21:02:38.032565Z"}, {"uuid": "f79da024-9c41-42ee-a85c-8fb6cd6c3c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/52811", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udd0d Exploit the CVE-2025-54424 RCE vulnerability in 1Panel, enabling unauthorized command execution through a certification bypass tool for scanning and exploitation.\nURL\uff1ahttps://github.com/bejbitoilet5125521/CVE-2025-54424\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-23T18:23:52.000000Z"}, {"uuid": "a8f0eba9-7bed-4510-a374-ae1847c3abbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "Telegram/rNEQ7C8h-YoGt_80B6TbxnS4o8KAOplyyEc6m8_1yEvHQ0s", "content": "", "creation_timestamp": "2025-08-14T15:00:38.000000Z"}, {"uuid": "2b92862e-0b8a-43a3-ac16-41eed2b44234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "Telegram/HXnB78LZ993EnbGXdL2hofKwYDoKHSeDPKMDrtCNi3QDgzw", "content": "", "creation_timestamp": "2025-08-14T09:00:04.000000Z"}, {"uuid": "6ffea819-09ec-4a0d-9ffb-40cf48b00b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46538", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-54424\uff1a1Panel \u5ba2\u6237\u7aef\u8bc1\u4e66\u7ed5\u8fc7RCE\u6f0f\u6d1e \u4e00\u4f53\u5316\u5de5\u5177 (\u626b\u63cf+\u5229\u7528)\nURL\uff1ahttps://github.com/Mr-xn/CVE-2025-54424\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-04T13:28:46.000000Z"}, {"uuid": "96dd1ffb-719b-4abb-a067-70077f06fd5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-544241", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46538", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-54424\uff1a1Panel \u5ba2\u6237\u7aef\u8bc1\u4e66\u7ed5\u8fc7RCE\u6f0f\u6d1e \u4e00\u4f53\u5316\u5de5\u5177 (\u626b\u63cf+\u5229\u7528)\nURL\uff1ahttps://github.com/Mr-xn/CVE-2025-54424\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-04T13:28:46.000000Z"}, {"uuid": "129139a7-5900-4103-8b64-5c62499c40d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/53945", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: &lt;= v2.0.5. \ud83d\udd10\nURL\uff1ahttps://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-02T21:56:02.000000Z"}, {"uuid": "c2252160-294c-4d77-8376-e3f41174c70f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-544241", "type": "published-proof-of-concept", "source": "Telegram/C3dLOex4qKF8CrF74Ro2jk8I9HmXrLWpS6IVMSsoWA8-ZJQ", "content": "", "creation_timestamp": "2025-08-04T21:00:05.000000Z"}, {"uuid": "911b6d54-6995-4e9e-845f-6ca7c1494488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-54424", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50494", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: &lt;= v2.0.5. \ud83d\udd10\nURL\uff1ahttps://github.com/hophtien/CVE-2025-54424\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-09-06T12:27:26.000000Z"}]}