{"uuid": "751ef247-de59-4d2b-b1ea-c0b769ac3fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-28771", "type": "exploited", "source": "https://t.me/KomunitiSiber/292", "content": "Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks\nhttps://thehackernews.com/2023/06/active-mirai-botnet-variant-exploiting.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has\u00a0added\u00a0a recently patched critical security flaw in Zyxel gear to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as\u00a0CVE-2023-28771\u00a0(CVSS score: 9.8), the issue relates to a\u00a0command injection flaw\u00a0impacting different firewall models that could enable an unauthenticated attacker", "creation_timestamp": "2023-06-01T07:14:54.000000Z"}