{"uuid": "8c76a424-1e40-454f-9673-33d4256e146a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31749", "type": "seen", "source": "https://t.me/cvedetector/16545", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-31749 - \"WatchGuard Fireware OS Arbitrary File Upload and Read Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2022-31749 \nPublished : Jan. 28, 2025, 12:15 a.m. | 45\u00a0minutes ago \nDescription : An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T02:04:02.000000Z"}