{"vulnerability": "CVE-2022-31898", "sightings": [{"uuid": "dba661e3-891c-483d-9723-1f297e377097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3300", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:37:58.000000Z"}, {"uuid": "024ccd6d-8a1d-45ca-b269-c717bcecba90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3298", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:19:44.000000Z"}, {"uuid": "4cb35dc3-b3cb-493d-8c58-9deb98068939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3441", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-17T13:07:20.000000Z"}, {"uuid": "a061c1f0-cbd3-46de-9a9f-fcaa2db44221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15399", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31898\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were discovered to contain multiple command injection vulnerabilities via the ping_addr and trace_addr function parameters.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T18:27:47.420Z\n\ud83d\udd17 References:\n1. https://boschko.ca/glinet-router", "creation_timestamp": "2025-05-07T19:22:38.000000Z"}, {"uuid": "ddeec860-ebff-4aec-9bf7-c71773d02963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3299", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:28:48.000000Z"}, {"uuid": "f9e91b18-6dbb-4915-b1b4-810bfad44449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/professional_c_h/1858", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]\n\nChannel:\n@Professional_c_h\n@card_crack_hack", "creation_timestamp": "2022-12-02T11:06:09.000000Z"}, {"uuid": "47dee084-bc6d-4778-a274-0a502ce370a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1407", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]", "creation_timestamp": "2022-11-19T07:58:56.000000Z"}, {"uuid": "9a315cc0-c630-48a3-959b-9ff0be3bc753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7155", "content": "#exploit\n1. CVE-2022-41352:\nZimbra &lt;9.0.0.p27 - Unauthenticated RCE\nhttps://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce\n\n2. CVE-2022-3949:\nXSS in Simple Cashiering System\nhttps://github.com/maikroservice/CVE-2022-3949\n\n3. CVE-2022-31898:\nCommand injection for GL-iNet routers with firm. &lt;3.215\nhttps://github.com/gigaryte/cve-2022-31898", "creation_timestamp": "2022-12-21T05:02:22.000000Z"}, {"uuid": "265b81c2-046b-437a-a944-536da90187a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2472", "content": "#CVE-2022\nExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nhttps://github.com/gigaryte/cve-2022-31898\n\n@BlueRedTeam", "creation_timestamp": "2022-11-19T20:51:11.000000Z"}]}