<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 12:43:21 +0000</lastBuildDate>
    <item>
      <title>09d4b574-7301-4c3a-ae71-6e7ca2696291</title>
      <link>https://db.gcve.eu/sighting/09d4b574-7301-4c3a-ae71-6e7ca2696291/export</link>
      <description>{"uuid": "09d4b574-7301-4c3a-ae71-6e7ca2696291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9977", "type": "seen", "source": "https://t.me/cvedetector/7916", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9977 - MitraStar GPT-2541GNAC BR Os Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9977 \nPublished : Oct. 15, 2024, 1:15 p.m. | 43\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-15T16:06:14.000000Z"}</description>
      <content:encoded>{"uuid": "09d4b574-7301-4c3a-ae71-6e7ca2696291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9977", "type": "seen", "source": "https://t.me/cvedetector/7916", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9977 - MitraStar GPT-2541GNAC BR Os Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9977 \nPublished : Oct. 15, 2024, 1:15 p.m. | 43\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly. \nSeverity: 4.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-15T16:06:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/09d4b574-7301-4c3a-ae71-6e7ca2696291/export</guid>
      <pubDate>Tue, 15 Oct 2024 16:06:14 +0000</pubDate>
    </item>
  </channel>
</rss>
