Rule Library

Sigma Rules

351 rules found for "initial-access"

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threatmediumtest

CVE-2023-22518 Exploitation Attempt - Vulnerable Endpoint Connection (Webserver)

Detects exploitation attempt of CVE-2023-22518 (Confluence Data Center / Confluence Server), where an attacker can exploit vulnerable endpoints to e.g. create admin accounts and execute arbitrary commands.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-22518detection.emerging-threats
Andreas Braathen (mnemonic.io)Tue Nov 142023
Emerging Threatmediumtest

Potential CVE-2023-2283 Exploitation

Detects potential exploitation attempt of CVE-2023-2283 an authentication bypass in libSSH. The exploitation method causes an error message stating that keys for curve25519 could not be generated. It is an error message that is a sign of an exploitation attempt. It is not a sign of a successful exploitation.

Linuxsshd
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-2283detection.emerging-threats
Florian Roth (Nextron Systems)Fri Jun 092023
Emerging Threatcriticaltest

CVE-2023-23397 Exploitation Attempt

Detects outlook initiating connection to a WebDAV or SMB share, which could be a sign of CVE-2023-23397 exploitation.

Windowssecurity
TA0006 · Credential AccessTA0001 · Initial Accesscve.2023-23397detection.emerging-threats
Robert LeeThu Mar 162023
Emerging Threathightest

Potential CVE-2023-23752 Exploitation Attempt

Detects the potential exploitation attempt of CVE-2023-23752 an Improper access check, in web service endpoints in Joomla

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-23752detection.emerging-threats
Bhabesh RajThu Feb 232023
Emerging Threathightest

Potential CVE-2023-25157 Exploitation Attempt

Detects a potential exploitation attempt of CVE-2023-25157 a SQL injection in GeoServer

Web Server Log
TA0001 · Initial Accesscve.2023-25157detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Jun 142023
Emerging Threathightest

Potential CVE-2023-25717 Exploitation Attempt

Detects a potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-25717detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue May 302023
Emerging Threatmediumtest

Potential CVE-2023-27997 Exploitation Indicators

Detects indicators of potential exploitation of CVE-2023-27997 in Frotigate weblogs. To avoid false positives it is best to look for successive requests to the endpoints mentioned as well as weird values of the "enc" parameter

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-27997detection.emerging-threats
Sergio Palacios Dominguez+1Fri Jul 282023
Emerging Threathightest

Potential MOVEit Transfer CVE-2023-34362 Exploitation - File Activity

Detects file indicators of potential exploitation of MOVEit CVE-2023-34362.

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-34362detection.emerging-threats
Florian Roth (Nextron Systems)+1Thu Jun 012023
Emerging Threathightest

Potential Information Disclosure CVE-2023-43261 Exploitation - Proxy

Detects exploitation attempts of CVE-2023-43261 and information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 that allows attackers to access sensitive router components in proxy logs.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-43621detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 202023
Emerging Threathightest

Potential Information Disclosure CVE-2023-43261 Exploitation - Web

Detects exploitation attempts of CVE-2023-43261 and information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 that allows attackers to access sensitive router components in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-43621detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Fri Oct 202023
Emerging Threathightest

CVE-2023-46747 Exploitation Activity - Proxy

Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-46747detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Nov 082023
Emerging Threathightest

CVE-2023-46747 Exploitation Activity - Webserver

Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-46747detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Nov 082023
Emerging Threathightest

CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy

Detects exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via proxy logs by looking for a very long host header string.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Nov 282023
Emerging Threatmediumtest

CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Proxy

Detects potential exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via proxy logs.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Nov 282023
Emerging Threatmediumtest

CVE-2023-4966 Potential Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

Detects potential exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via webserver logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)+1Tue Nov 282023
Emerging Threathightest

CVE-2023-4966 Exploitation Attempt - Citrix ADC Sensitive Information Disclosure - Webserver

Detects exploitation attempt of CVE-2023-4966 a Citrix ADC and NetScaler Gateway sensitive information disclosure vulnerability via webserver logs by looking for a very long host header string.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2023-4966detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Tue Nov 282023
Emerging Threathightest

Potential Exploitation Attempt Of Undocumented WindowsServer RCE

Detects potential exploitation attempt of undocumented Windows Server Pre Auth Remote Code Execution (RCE)

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threats
Florian Roth (Nextron Systems)+1Sat Jan 212023
Emerging Threatmediumtest

DarkGate - Autoit3.EXE File Creation By Uncommon Process

Detects the usage of curl.exe, KeyScramblerLogon, or other non-standard/suspicious processes used to create Autoit3.exe. This activity has been associated with DarkGate malware, which uses Autoit3.exe to execute shellcode that performs process injection and connects to the DarkGate command-and-control server. Curl, KeyScramblerLogon, and these other processes consitute non-standard and suspicious ways to retrieve the Autoit3 executable.

WindowsFile Event
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool TransferT1059 · Command and Scripting Interpreter+1
Micah BabinskiSun Oct 152023
Emerging Threathightest

DarkGate - Autoit3.EXE Execution Parameters

Detects execution of the legitimate Autoit3 utility from a suspicious parent process. AutoIt3.exe is used within the DarkGate infection chain to execute shellcode that performs process injection and connects to the DarkGate command-and-control server.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Micah BabinskiSun Oct 152023
Emerging Threathightest

CVE-2024-1212 Exploitation - Progress Kemp LoadMaster Unauthenticated Command Injection

Detects potential exploitation of CVE-2024-1709 an unauthenticated command injection in Progress Kemp LoadMaster. It looks for GET requests to '/access/set' API with the parameters 'param=enableapi' and 'value=1' as well as an "Authorization" header with a base64 encoded value with an uncommon character.

Web Server Log
TA0001 · Initial Accesscve.2024-1212detection.emerging-threats
Nasreddine Bencherchali (Nextron Systems)Wed Mar 202024
Emerging Threatcriticaltest

CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security

This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708. This requires an Advanced Auditing policy to log a successful Windows Event ID 4663 events and with a SACL set on the directory.

Windowssecurity
TA0001 · Initial AccessTA0003 · Persistencecve.2024-1708detection.emerging-threats
Matt Anderson+2Tue Feb 202024
Emerging Threatcriticaltest

CVE-2024-1709 - ScreenConnect Authentication Bypass Exploitation

Detects GET requests to '/SetupWizard.aspx/[anythinghere]' that indicate exploitation of the ScreenConnect vulnerability CVE-2024-1709.

Web Server Log
TA0001 · Initial AccessTA0003 · Persistencecve.2024-1709detection.emerging-threats
Matt Anderson+1Tue Feb 202024
Emerging Threathightest

Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect. This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.

paloaltoapplianceglobalprotect
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+2
Nasreddine Bencherchali (Nextron Systems)Thu Apr 182024
Emerging Threathighexperimental

CVE-2024-50623 Exploitation Attempt - Cleo

Detects exploitation attempt of Cleo's CVE-2024-50623 by looking for a "cmd.exe" process spawning from the Celo software suite with suspicious Powershell commandline.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1190 · Exploit Public-Facing Applicationcve.2024-50623+1
Tanner Filip+3Mon Dec 092024
Emerging Threatmediumtest

Potential APT FIN7 Exploitation Activity

Detects potential APT FIN7 exploitation activity as reported by Google. In order to obtain initial access, FIN7 used compromised Remote Desktop Protocol (RDP) credentials to login to a target server and initiate specific Windows process chains.

WindowsProcess Creation
TA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shelldetection.emerging-threats
Alex WalstonMon Jul 292024
Emerging Threathighexperimental

Potential Exploitation of GoAnywhere MFT Vulnerability

Detects suspicious command execution by child processes of the GoAnywhere Managed File Transfer (MFT) application, which may indicate exploitation such as CVE-2025-10035. This behavior is indicative of post-exploitation activity related to CVE-2025-10035, as observed in campaigns by the threat actor Storm-1175.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1059.001 · PowerShell+4
MSFT+1Tue Oct 072025
Emerging Threathighexperimental

Cisco ASA Exploitation Activity - Proxy

Detects suspicious requests to Cisco ASA WebVpn via proxy logs associated with CVE-2025-20333 and CVE-2025-20362 exploitation.

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2025-20333cve.2025-20362+1
Swachchhanda Shrawan Poudel (Nextron Systems)Thu Nov 202025
Emerging Threatmediumexperimental

Suspicious CrushFTP Child Process

Detects suspicious child processes spawned by the CrushFTP service that may indicate exploitation of remote code execution vulnerabilities such as CVE-2025-31161, where attackers can achieve RCE through crafted HTTP requests. The detection focuses on commonly abused Windows executables (like powershell.exe, cmd.exe etc.) that attackers typically use post-exploitation to execute malicious commands.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command Shell+3
Craig Sweeney+6Thu Apr 102025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation - Linux

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

LinuxFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Potential SAP NetWeaver Webshell Creation

Detects the creation of suspicious files (jsp, java, class) in SAP NetWeaver directories, which may indicate exploitation attempts of vulnerabilities such as CVE-2025-31324.

WindowsFile Event
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver - Linux

Detects suspicious child processes spawned by SAP NetWeaver on Linux systems that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

LinuxProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threatmediumexperimental

Suspicious Child Process of SAP NetWeaver

Detects suspicious child processes spawned by SAP NetWeaver that could indicate potential exploitation of vulnerability that allows arbitrary execution via webshells such as CVE-2025-31324.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0003 · Persistence+3
Elastic Security+1Mon Apr 282025
Emerging Threathighexperimental

Potential SAP NetViewer Webshell Command Execution

Detects potential command execution via webshell in SAP NetViewer through JSP files with cmd parameter. This rule is created to detect exploitation of vulnerabilities like CVE-2025-31324, which allows remote code execution via a webshell.

Web Server Log
TA0003 · PersistenceT1505.003 · Web ShellTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Swachchhanda Shrawan Poudel (Nextron Systems)Wed May 142025
Emerging Threathighexperimental

Suspicious Child Process of SolarWinds WebHelpDesk

Detects suspicious child processes spawned by SolarWinds WebHelpDesk (WHD) application, which may indicate exploitation activity leveraging RCE vulnerabilities such as CVE-2025-40551, CVE-2025-40536, or CVE-2025-26399

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2025-26399cve.2025-40536+2
Huntress Team+1Wed Feb 112025
Emerging Threathighexperimental

Potential Exploitation of CVE-2025-4427/4428 Ivanti EPMM Pre-Auth RCE

Detects potential exploitation of a chained vulnerability attack targeting Ivanti EPMM 12.5.0.0. CVE-2025-4427 allows unauthenticated access to protected API endpoints via an authentication bypass, which can then be leveraged to trigger CVE-2025-4428 — a remote code execution vulnerability through template injection. This sequence enables unauthenticated remote code execution, significantly increasing the impact of exploitation.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0002 · ExecutionT1203 · Exploitation for Client Execution+3
Swachchhanda Shrawan Poudel (Nextron Systems)Tue May 202025
Emerging Threatcriticalexperimental

Potential SharePoint ToolShell CVE-2025-53770 Exploitation - File Create

Detects the creation of file such as spinstall0.aspx which may indicate successful exploitation of CVE-2025-53770. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.

WindowsFile Event
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2025-53770detection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jul 212025
Emerging Threathighexperimental

Potential SharePoint ToolShell CVE-2025-53770 Exploitation Indicators

Detects potential exploitation of CVE-2025-53770 by identifying indicators such as suspicious command lines discovered in Post-Exploitation activities. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2025-53770detection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jul 212025
Emerging Threatmediumexperimental

SharePoint ToolShell CVE-2025-53770 Exploitation - Web IIS

Detects access to vulnerable SharePoint components potentially being exploited in CVE-2025-53770 through IIS web server logs. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationcve.2025-53770detection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jul 212025
Emerging Threathighexperimental

Potential Exploitation of CrushFTP RCE Vulnerability (CVE-2025-54309)

Detects suspicious child processes created by CrushFTP. It could be an indication of exploitation of a RCE vulnerability such as CVE-2025-54309.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1059.001 · PowerShell+5
Nisarg SutharFri Aug 012025
Emerging Threathighexperimental

Linux Suspicious Child Process from Node.js - React2Shell

Detects suspicious child processes spawned from Node.js server processes on Linux systems, potentially indicating remote code execution exploitation such as CVE-2025-55182 (React2Shell). This rule particularly looks for exploitation of vulnerability on Node.js Servers where attackers abuse Node.js child_process module to execute arbitrary system commands. When execSync() or exec() is used, the command line often includes a shell invocation followed by suspicious commands or scripts (e.g., /bin/sh -c <malicious-command>). For other methods, the Image field will show the spawned process directly.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Swachchhanda Shrawan Poudel (Nextron Systems)+1Fri Dec 052025
Emerging Threathighexperimental

Windows Suspicious Child Process from Node.js - React2Shell

Detects suspicious child processes started by Node.js server processes on Windows, which may indicate exploitation of vulnerabilities like CVE-2025-55182 (React2Shell). Attackers can abuse the Node.js 'child_process' module to run system commands or scripts using methods such as spawn(), exec(), execFile(), fork(), or execSync(). If execSync() or exec() is used in the exploit, the command line often shows a shell (e.g., cmd.exe /d /s /c ...) running a suspicious command unless other shells are explicitly invoked. For other methods, the spawned process appears directly in the Image field unless a shell is explicitly used.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterTA0001 · Initial AccessT1190 · Exploit Public-Facing Application+2
Swachchhanda Shrawan Poudel (Nextron Systems)+1Fri Dec 052025
Emerging Threatmediumexperimental

Commvault QLogin with PublicSharingUser and GUID Password (CVE-2025-57788)

Detects a qlogin.exe command attempting to authenticate as the internal `_+_PublicSharingUser_` using a GUID as the password. This could be an indicator of an attacker exploiting CVE-2025-57788 to gain initial access using leaked credentials.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Oct 202025
Emerging Threathighexperimental

Commvault QLogin Argument Injection Authentication Bypass (CVE-2025-57791)

Detects the use of argument injection in the Commvault qlogin command - potential exploitation for CVE-2025-57791. An attacker can inject the `-localadmin` parameter via the password field to bypass authentication and gain a privileged token.

WindowsProcess Creation
TA0001 · Initial AccessT1190 · Exploit Public-Facing Applicationdetection.emerging-threatscve.2025-57791
X__Junior (Nextron Systems)+1Mon Oct 202025
Emerging Threathighexperimental

Exploitation Activity of CVE-2025-59287 - WSUS Suspicious Child Process

Detects the creation of command-line interpreters (cmd.exe, powershell.exe) as child processes of Windows Server Update Services (WSUS) related process wsusservice.exe. This behavior is a key indicator of exploitation for the critical remote code execution vulnerability such as CVE-2025-59287, where attackers spawn shells to conduct reconnaissance and further post-exploitation activities.

WindowsProcess Creation
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationT1203 · Exploitation for Client Execution+2
Huntress Labs+1Fri Oct 312025
Emerging Threathighexperimental

Exploitation Activity of CVE-2025-59287 - WSUS Deserialization

Detects cast exceptions in Windows Server Update Services (WSUS) application logs that highly indicate exploitation attempts of CVE-2025-59287, a deserialization vulnerability in WSUS.

Windowsapplication
TA0002 · ExecutionTA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationT1203 · Exploitation for Client Execution+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Oct 312025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution - Linux

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

LinuxProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation - Linux

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

WindowsProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025