<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 17 May 2026 02:57:29 +0000</lastBuildDate>
    <item>
      <title>e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef</title>
      <link>https://db.gcve.eu/sighting/e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef/export</link>
      <description>{"uuid": "e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5113", "type": "seen", "source": "Telegram/OE92hMtDo0Ldfy3Zq_SV2j3A7EyX_CyNZtR1RN6FwvoL06zp", "content": "", "creation_timestamp": "2025-02-21T22:10:27.000000Z"}</description>
      <content:encoded>{"uuid": "e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5113", "type": "seen", "source": "Telegram/OE92hMtDo0Ldfy3Zq_SV2j3A7EyX_CyNZtR1RN6FwvoL06zp", "content": "", "creation_timestamp": "2025-02-21T22:10:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e9f78ac8-4a5d-410e-9de1-ffd42cbad6ef/export</guid>
      <pubDate>Fri, 21 Feb 2025 22:10:27 +0000</pubDate>
    </item>
    <item>
      <title>28e1955f-082e-4a9d-aa9c-c8b52c2df9ca</title>
      <link>https://db.gcve.eu/sighting/28e1955f-082e-4a9d-aa9c-c8b52c2df9ca/export</link>
      <description>{"uuid": "28e1955f-082e-4a9d-aa9c-c8b52c2df9ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.106543Z"}</description>
      <content:encoded>{"uuid": "28e1955f-082e-4a9d-aa9c-c8b52c2df9ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.106543Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/28e1955f-082e-4a9d-aa9c-c8b52c2df9ca/export</guid>
      <pubDate>Thu, 27 Feb 2025 21:35:43 +0000</pubDate>
    </item>
    <item>
      <title>449635dc-9aad-4e7a-8f47-94cbd53b62b2</title>
      <link>https://db.gcve.eu/sighting/449635dc-9aad-4e7a-8f47-94cbd53b62b2/export</link>
      <description>{"uuid": "449635dc-9aad-4e7a-8f47-94cbd53b62b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.224307Z"}</description>
      <content:encoded>{"uuid": "449635dc-9aad-4e7a-8f47-94cbd53b62b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114078000233980303", "content": "", "creation_timestamp": "2025-02-27T21:35:43.224307Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/449635dc-9aad-4e7a-8f47-94cbd53b62b2/export</guid>
      <pubDate>Thu, 27 Feb 2025 21:35:43 +0000</pubDate>
    </item>
    <item>
      <title>cc16800b-ea5a-4831-a280-2191e9856852</title>
      <link>https://db.gcve.eu/sighting/cc16800b-ea5a-4831-a280-2191e9856852/export</link>
      <description>{"uuid": "cc16800b-ea5a-4831-a280-2191e9856852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://t.me/cvedetector/19072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51138 - TP-Link Vigor TR069 STUN Server Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51138 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:45.000000Z"}</description>
      <content:encoded>{"uuid": "cc16800b-ea5a-4831-a280-2191e9856852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://t.me/cvedetector/19072", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51138 - TP-Link Vigor TR069 STUN Server Stack-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51138 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.8 and earlier; Vigor2862/2926 3.9.9.5 and earlier; Vigor2133/2762/2832 3.9.9 and earlier; Vigor2135/2765/2766 4.4.5. and earlier; Vigor2865/2866/2927 4.4.5.3 and earlier; Vigor2962 4.3.2.8 and earlier; Vigor3912 4.3.6.1 and earlier; Vigor3910 4.4.3.1 and earlier a stack-based buffer overflow vulnerability has been identified in the URL parsing functionality of the TR069 STUN server. This flaw occurs due to insufficient bounds checking on the amount of URL parameters, allowing an attacker to exploit the overflow by sending a maliciously crafted request. Consequently, a remote attacker can execute arbitrary code with elevated privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cc16800b-ea5a-4831-a280-2191e9856852/export</guid>
      <pubDate>Thu, 27 Feb 2025 23:26:45 +0000</pubDate>
    </item>
    <item>
      <title>35fdba15-ea27-4d94-92db-80a2220f3a61</title>
      <link>https://db.gcve.eu/sighting/35fdba15-ea27-4d94-92db-80a2220f3a61/export</link>
      <description>{"uuid": "35fdba15-ea27-4d94-92db-80a2220f3a61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://t.me/cvedetector/19073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51139 - Netgear Vigor Router Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51139 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:46.000000Z"}</description>
      <content:encoded>{"uuid": "35fdba15-ea27-4d94-92db-80a2220f3a61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://t.me/cvedetector/19073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51139 - Netgear Vigor Router Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51139 \nPublished : Feb. 27, 2025, 9:15 p.m. | 21\u00a0minutes ago \nDescription : Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-27T23:26:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/35fdba15-ea27-4d94-92db-80a2220f3a61/export</guid>
      <pubDate>Thu, 27 Feb 2025 23:26:46 +0000</pubDate>
    </item>
    <item>
      <title>f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f</title>
      <link>https://db.gcve.eu/sighting/f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f/export</link>
      <description>{"uuid": "f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5921", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51139\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T17:23:14.780Z\n\ud83d\udd17 References:\n1. http://draytek.com\n2. https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946", "creation_timestamp": "2025-02-28T17:27:05.000000Z"}</description>
      <content:encoded>{"uuid": "f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5921", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-51139\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Buffer Overflow vulnerability in Vigor2620/LTE200 3.9.8.9 and earlier and Vigor2860/2925 3.9.8 and earlier and Vigor2862/2926 3.9.9.5 and earlier and Vigor2133/2762/2832 3.9.9 and earlier and Vigor165/166 4.2.7 and earlier and Vigor2135/2765/2766 4.4.5.1 and earlier and Vigor2865/2866/2927 4.4.5.3 and earlier and Vigor2962/3910 4.3.2.8/4.4.3.1 and earlier and Vigor3912 4.3.6.1 and earlier allows a remote attacker to execute arbitrary code via the CGI parser's handling of the \"Content-Length\" header of HTTP POST requests.\n\ud83d\udccf Published: 2025-02-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T17:23:14.780Z\n\ud83d\udd17 References:\n1. http://draytek.com\n2. https://medium.com/faraday/advisory-multiple-vulnerabilities-affecting-draytek-routers-78a6cb8b3946", "creation_timestamp": "2025-02-28T17:27:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f9c1e7c9-bc3e-460d-98b8-9640b2ff3a4f/export</guid>
      <pubDate>Fri, 28 Feb 2025 17:27:05 +0000</pubDate>
    </item>
    <item>
      <title>696de295-bf5f-4ff3-adb7-51691e38f1e4</title>
      <link>https://db.gcve.eu/sighting/696de295-bf5f-4ff3-adb7-51691e38f1e4/export</link>
      <description>{"uuid": "696de295-bf5f-4ff3-adb7-51691e38f1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114083241199567069", "content": "", "creation_timestamp": "2025-02-28T19:49:09.667612Z"}</description>
      <content:encoded>{"uuid": "696de295-bf5f-4ff3-adb7-51691e38f1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114083241199567069", "content": "", "creation_timestamp": "2025-02-28T19:49:09.667612Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/696de295-bf5f-4ff3-adb7-51691e38f1e4/export</guid>
      <pubDate>Fri, 28 Feb 2025 19:49:09 +0000</pubDate>
    </item>
    <item>
      <title>cf2c7f09-0a45-4c36-8e3a-820a553dd5dd</title>
      <link>https://db.gcve.eu/sighting/cf2c7f09-0a45-4c36-8e3a-820a553dd5dd/export</link>
      <description>{"uuid": "cf2c7f09-0a45-4c36-8e3a-820a553dd5dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114084184639914320", "content": "", "creation_timestamp": "2025-02-28T23:48:37.719985Z"}</description>
      <content:encoded>{"uuid": "cf2c7f09-0a45-4c36-8e3a-820a553dd5dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51138", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114084184639914320", "content": "", "creation_timestamp": "2025-02-28T23:48:37.719985Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cf2c7f09-0a45-4c36-8e3a-820a553dd5dd/export</guid>
      <pubDate>Fri, 28 Feb 2025 23:48:37 +0000</pubDate>
    </item>
    <item>
      <title>ac515270-5939-4a43-884e-655d96036823</title>
      <link>https://db.gcve.eu/sighting/ac515270-5939-4a43-884e-655d96036823/export</link>
      <description>{"uuid": "ac515270-5939-4a43-884e-655d96036823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "Telegram/a-KbHMaydG4wvUw-hFKaFz8PP4CLd7hDJTIYGL0kr7XOvzZv", "content": "", "creation_timestamp": "2025-03-02T11:45:38.000000Z"}</description>
      <content:encoded>{"uuid": "ac515270-5939-4a43-884e-655d96036823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "Telegram/a-KbHMaydG4wvUw-hFKaFz8PP4CLd7hDJTIYGL0kr7XOvzZv", "content": "", "creation_timestamp": "2025-03-02T11:45:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ac515270-5939-4a43-884e-655d96036823/export</guid>
      <pubDate>Sun, 02 Mar 2025 11:45:38 +0000</pubDate>
    </item>
    <item>
      <title>4acb1328-dcd4-4a71-bc43-ca51c87706bd</title>
      <link>https://db.gcve.eu/sighting/4acb1328-dcd4-4a71-bc43-ca51c87706bd/export</link>
      <description>{"uuid": "4acb1328-dcd4-4a71-bc43-ca51c87706bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}</description>
      <content:encoded>{"uuid": "4acb1328-dcd4-4a71-bc43-ca51c87706bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51139", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4acb1328-dcd4-4a71-bc43-ca51c87706bd/export</guid>
      <pubDate>Tue, 19 Aug 2025 18:29:29 +0000</pubDate>
    </item>
  </channel>
</rss>
