<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T19:02:43.052763+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/cfb5de71-dcc9-4656-8fda-0a3a23c4fc78/export</id>
    <title>cfb5de71-dcc9-4656-8fda-0a3a23c4fc78</title>
    <updated>2026-05-08T19:02:43.458241+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cfb5de71-dcc9-4656-8fda-0a3a23c4fc78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13893\n\ud83d\udd25 CVSS Score: 7.5 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0\nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well.\n\ud83d\udccf Published: 2025-03-06T14:01:06.389Z\n\ud83d\udccf Modified: 2025-03-06T14:04:35.995Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/03/CVE-2024-13892/\n2. https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at", "creation_timestamp": "2025-03-06T15:10:47.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cfb5de71-dcc9-4656-8fda-0a3a23c4fc78/export"/>
    <published>2025-03-06T15:10:47+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/774a9c0b-32fc-499c-9d0a-ca908c5512dc/export</id>
    <title>774a9c0b-32fc-499c-9d0a-ca908c5512dc</title>
    <updated>2026-05-08T19:02:43.456871+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "774a9c0b-32fc-499c-9d0a-ca908c5512dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/cvedetector/19713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13893 - Smartwares Cameras Telnet Service Credential Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-13893 \nPublished : March 6, 2025, 2:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.  \nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0  \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.  \n Newer firmware versions might be vulnerable as well. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:11:08.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/774a9c0b-32fc-499c-9d0a-ca908c5512dc/export"/>
    <published>2025-03-06T17:11:08+00:00</published>
  </entry>
</feed>
