{"uuid": "0d6a6de5-d6f4-4a39-9f97-d42412fe52e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27217", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8324", "content": "#exploit\n1. Critical Sandbox Escape Vulnerability in VM2\nhttps://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac\n\n2. Wago License Page Exploit\nhttps://onekey.com/blog/security-advisory-wago-unauthenticated-remote-command-execution\n\n3. CVE-2023-27217:\n\"FriendlyName\" Buffer Overflow in Wemo Smart Plug V2\nhttps://sternumiot.com/iot-blog/mini-smart-plug-v2-vulnerability-buffer-overflow", "creation_timestamp": "2023-05-19T11:07:01.000000Z"}