<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 19:02:42 +0000</lastBuildDate>
    <item>
      <title>cfb5de71-dcc9-4656-8fda-0a3a23c4fc78</title>
      <link>https://db.gcve.eu/sighting/cfb5de71-dcc9-4656-8fda-0a3a23c4fc78/export</link>
      <description>{"uuid": "cfb5de71-dcc9-4656-8fda-0a3a23c4fc78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13893\n\ud83d\udd25 CVSS Score: 7.5 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0\nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well.\n\ud83d\udccf Published: 2025-03-06T14:01:06.389Z\n\ud83d\udccf Modified: 2025-03-06T14:04:35.995Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/03/CVE-2024-13892/\n2. https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at", "creation_timestamp": "2025-03-06T15:10:47.000000Z"}</description>
      <content:encoded>{"uuid": "cfb5de71-dcc9-4656-8fda-0a3a23c4fc78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13893\n\ud83d\udd25 CVSS Score: 7.5 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.\nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0\nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.\n Newer firmware versions might be vulnerable as well.\n\ud83d\udccf Published: 2025-03-06T14:01:06.389Z\n\ud83d\udccf Modified: 2025-03-06T14:04:35.995Z\n\ud83d\udd17 References:\n1. https://cert.pl/en/posts/2025/03/CVE-2024-13892/\n2. https://www.smartwares.eu/en-gb/smartwares-cip-37210at-indoor-wi-fi-camera-cip--37210at", "creation_timestamp": "2025-03-06T15:10:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cfb5de71-dcc9-4656-8fda-0a3a23c4fc78/export</guid>
      <pubDate>Thu, 06 Mar 2025 15:10:47 +0000</pubDate>
    </item>
    <item>
      <title>774a9c0b-32fc-499c-9d0a-ca908c5512dc</title>
      <link>https://db.gcve.eu/sighting/774a9c0b-32fc-499c-9d0a-ca908c5512dc/export</link>
      <description>{"uuid": "774a9c0b-32fc-499c-9d0a-ca908c5512dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/cvedetector/19713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13893 - Smartwares Cameras Telnet Service Credential Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-13893 \nPublished : March 6, 2025, 2:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.  \nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0  \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.  \n Newer firmware versions might be vulnerable as well. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:11:08.000000Z"}</description>
      <content:encoded>{"uuid": "774a9c0b-32fc-499c-9d0a-ca908c5512dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/cvedetector/19713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13893 - Smartwares Cameras Telnet Service Credential Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-13893 \nPublished : March 6, 2025, 2:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.  \nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0  \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.  \n Newer firmware versions might be vulnerable as well. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:11:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/774a9c0b-32fc-499c-9d0a-ca908c5512dc/export</guid>
      <pubDate>Thu, 06 Mar 2025 17:11:08 +0000</pubDate>
    </item>
  </channel>
</rss>
