{"uuid": "8256d60f-e303-4d59-a0c8-04edf80e1645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12013", "type": "seen", "source": "https://t.me/cvedetector/18037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12013 - Fortinet TCP/IP Gateway Default Credentials Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-12013 \nPublished : Feb. 13, 2025, 4:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : A CWE-1392 \u201cUse of Default Credentials\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The device exposes an FTP server with default and easy-to-guess admin credentials. A remote attacker capable of interacting with the FTP server could gain access and perform changes over resources exposed by the service such as configuration files where password hashes are saved or where network settings are stored. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T18:50:45.000000Z"}