<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 19:06:13 +0000</lastBuildDate>
    <item>
      <title>813b1285-c8c7-43ef-a96c-6f7d72240951</title>
      <link>https://db.gcve.eu/sighting/813b1285-c8c7-43ef-a96c-6f7d72240951/export</link>
      <description>{"uuid": "813b1285-c8c7-43ef-a96c-6f7d72240951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/21708", "content": "Critical RCE Bug Affects Millions of OpenWrt-based Network Devices A cybersecurity researcher today disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, a widely used Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic.\n\nTracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the", "creation_timestamp": "2020-03-24T21:35:27.000000Z"}</description>
      <content:encoded>{"uuid": "813b1285-c8c7-43ef-a96c-6f7d72240951", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/21708", "content": "Critical RCE Bug Affects Millions of OpenWrt-based Network Devices A cybersecurity researcher today disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, a widely used Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic.\n\nTracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the", "creation_timestamp": "2020-03-24T21:35:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/813b1285-c8c7-43ef-a96c-6f7d72240951/export</guid>
      <pubDate>Tue, 24 Mar 2020 21:35:27 +0000</pubDate>
    </item>
    <item>
      <title>727b7b64-cb0b-42b9-aeed-e9fe782b4967</title>
      <link>https://db.gcve.eu/sighting/727b7b64-cb0b-42b9-aeed-e9fe782b4967/export</link>
      <description>{"uuid": "727b7b64-cb0b-42b9-aeed-e9fe782b4967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "seen", "source": "Telegram/Jum2kdRcpL_6eH0r3t0QHBoLeqQ8wLPgagnwArxT58_IdfU", "content": "", "creation_timestamp": "2020-04-06T19:33:44.000000Z"}</description>
      <content:encoded>{"uuid": "727b7b64-cb0b-42b9-aeed-e9fe782b4967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "seen", "source": "Telegram/Jum2kdRcpL_6eH0r3t0QHBoLeqQ8wLPgagnwArxT58_IdfU", "content": "", "creation_timestamp": "2020-04-06T19:33:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/727b7b64-cb0b-42b9-aeed-e9fe782b4967/export</guid>
      <pubDate>Mon, 06 Apr 2020 19:33:44 +0000</pubDate>
    </item>
    <item>
      <title>78c359fe-b95a-4769-a4cd-6eedc9057dee</title>
      <link>https://db.gcve.eu/sighting/78c359fe-b95a-4769-a4cd-6eedc9057dee/export</link>
      <description>{"uuid": "78c359fe-b95a-4769-a4cd-6eedc9057dee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "seen", "source": "Telegram/lhJxVJEyxPY7Xl40oJyfm1uyLFRL117rPvuXk2UcjUIGC8Y", "content": "", "creation_timestamp": "2020-04-06T19:33:48.000000Z"}</description>
      <content:encoded>{"uuid": "78c359fe-b95a-4769-a4cd-6eedc9057dee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "seen", "source": "Telegram/lhJxVJEyxPY7Xl40oJyfm1uyLFRL117rPvuXk2UcjUIGC8Y", "content": "", "creation_timestamp": "2020-04-06T19:33:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/78c359fe-b95a-4769-a4cd-6eedc9057dee/export</guid>
      <pubDate>Mon, 06 Apr 2020 19:33:48 +0000</pubDate>
    </item>
    <item>
      <title>9f62dee1-e659-45f5-8327-2e6a65ef88d8</title>
      <link>https://db.gcve.eu/sighting/9f62dee1-e659-45f5-8327-2e6a65ef88d8/export</link>
      <description>{"uuid": "9f62dee1-e659-45f5-8327-2e6a65ef88d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "Telegram/kxlb9TNUj__yuUYhIHd5dBTJpt24zMsQrjrhakHQ1w5TOYA", "content": "", "creation_timestamp": "2020-04-06T19:42:28.000000Z"}</description>
      <content:encoded>{"uuid": "9f62dee1-e659-45f5-8327-2e6a65ef88d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "Telegram/kxlb9TNUj__yuUYhIHd5dBTJpt24zMsQrjrhakHQ1w5TOYA", "content": "", "creation_timestamp": "2020-04-06T19:42:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9f62dee1-e659-45f5-8327-2e6a65ef88d8/export</guid>
      <pubDate>Mon, 06 Apr 2020 19:42:28 +0000</pubDate>
    </item>
    <item>
      <title>64cfba41-5c62-40f7-aef7-8048b9b38710</title>
      <link>https://db.gcve.eu/sighting/64cfba41-5c62-40f7-aef7-8048b9b38710/export</link>
      <description>{"uuid": "64cfba41-5c62-40f7-aef7-8048b9b38710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/367", "content": "Uncovering OpenWRT remote code execution (CVE-2020-7982)\n\nContinue reading at blog.forallsecure.com (from /r/netsec)", "creation_timestamp": "2020-04-07T14:08:27.000000Z"}</description>
      <content:encoded>{"uuid": "64cfba41-5c62-40f7-aef7-8048b9b38710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/367", "content": "Uncovering OpenWRT remote code execution (CVE-2020-7982)\n\nContinue reading at blog.forallsecure.com (from /r/netsec)", "creation_timestamp": "2020-04-07T14:08:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/64cfba41-5c62-40f7-aef7-8048b9b38710/export</guid>
      <pubDate>Tue, 07 Apr 2020 14:08:27 +0000</pubDate>
    </item>
    <item>
      <title>197c5064-227e-45c7-93b9-3df6ac89a067</title>
      <link>https://db.gcve.eu/sighting/197c5064-227e-45c7-93b9-3df6ac89a067/export</link>
      <description>{"uuid": "197c5064-227e-45c7-93b9-3df6ac89a067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6359", "content": "UNCOVERING OPENWRT REMOTE CODE EXECUTION (CVE-2020-7982)\nhttps://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982", "creation_timestamp": "2020-04-07T15:29:54.000000Z"}</description>
      <content:encoded>{"uuid": "197c5064-227e-45c7-93b9-3df6ac89a067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6359", "content": "UNCOVERING OPENWRT REMOTE CODE EXECUTION (CVE-2020-7982)\nhttps://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982", "creation_timestamp": "2020-04-07T15:29:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/197c5064-227e-45c7-93b9-3df6ac89a067/export</guid>
      <pubDate>Tue, 07 Apr 2020 15:29:54 +0000</pubDate>
    </item>
    <item>
      <title>2d46a61e-16de-431c-b088-ca2dafc4e52f</title>
      <link>https://db.gcve.eu/sighting/2d46a61e-16de-431c-b088-ca2dafc4e52f/export</link>
      <description>{"uuid": "2d46a61e-16de-431c-b088-ca2dafc4e52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/282", "content": "https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982", "creation_timestamp": "2020-04-13T09:11:16.000000Z"}</description>
      <content:encoded>{"uuid": "2d46a61e-16de-431c-b088-ca2dafc4e52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/282", "content": "https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982", "creation_timestamp": "2020-04-13T09:11:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2d46a61e-16de-431c-b088-ca2dafc4e52f/export</guid>
      <pubDate>Mon, 13 Apr 2020 09:11:16 +0000</pubDate>
    </item>
    <item>
      <title>0e15e32f-3c6e-42ca-9fd1-89227d2dddea</title>
      <link>https://db.gcve.eu/sighting/0e15e32f-3c6e-42ca-9fd1-89227d2dddea/export</link>
      <description>{"uuid": "0e15e32f-3c6e-42ca-9fd1-89227d2dddea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/847", "content": "#exploit\n1. CVE-2020-7982:\nUncovering OpenWRT 18.06.0 - 18.06.6, 19.07.0, LEDE 17.01.0-17.01.7 - RCE\nhttps://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982\n\n2. Memcached 1.6.0, 1.6.1:\nRemote DOS attack/0day BoF vulnerability reveal\u00a0\nhttps://github.com/memcached/memcached/issues/629", "creation_timestamp": "2024-10-17T18:26:48.000000Z"}</description>
      <content:encoded>{"uuid": "0e15e32f-3c6e-42ca-9fd1-89227d2dddea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7982", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/847", "content": "#exploit\n1. CVE-2020-7982:\nUncovering OpenWRT 18.06.0 - 18.06.6, 19.07.0, LEDE 17.01.0-17.01.7 - RCE\nhttps://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982\n\n2. Memcached 1.6.0, 1.6.1:\nRemote DOS attack/0day BoF vulnerability reveal\u00a0\nhttps://github.com/memcached/memcached/issues/629", "creation_timestamp": "2024-10-17T18:26:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0e15e32f-3c6e-42ca-9fd1-89227d2dddea/export</guid>
      <pubDate>Thu, 17 Oct 2024 18:26:48 +0000</pubDate>
    </item>
  </channel>
</rss>
