{"vulnerability": "CVE-2024-53375", "sightings": [{"uuid": "e93dd87b-bb25-4bb8-a71e-df248cd5aaee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m6nbebo65e26", "content": "", "creation_timestamp": "2025-11-27T21:02:30.033885Z"}, {"uuid": "1f3510e5-d622-4d35-8180-fa0ac5a02caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115621753678740046", "content": "", "creation_timestamp": "2025-11-27T12:52:31.366800Z"}, {"uuid": "c2df1d7e-9547-4cc7-968f-4e6dee5cbda0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "https://t.me/cvedetector/11831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53375 - \"TP-Link Archer, Deco, and Tapo Router HomeShield tmp_get_sites RCE Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-53375 \nPublished : Dec. 2, 2024, 10:15 p.m. | 30\u00a0minutes ago \nDescription : Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the \"tmp_get_sites\" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T23:46:40.000000Z"}, {"uuid": "ea2f6060-3791-469f-bce8-b65e9df2ed30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2436", "content": "CVE-2024-53375 \n*\nTP-Link Archer AXE75 Authenticated Command Injection\n*\nExploit", "creation_timestamp": "2024-12-19T12:33:28.000000Z"}, {"uuid": "92050e4c-1c16-4ebd-9ce0-d710ebde2640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/161", "content": "https://thottysploity.github.io/posts/cve-2024-53375/\n\nCVE-2024-53375 TP-Link Archer router series Authenticated RCE\n\nhttps://github.com/ThottySploity/CVE-2024-53375/\n\n#\u5206\u6790 #github #exploit", "creation_timestamp": "2024-12-20T20:18:51.000000Z"}, {"uuid": "20a46c35-4344-4b15-a44c-a864b899b65a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "MISP/d776572a-20aa-5bd6-8c28-05f8506eaf72", "content": "", "creation_timestamp": "2025-11-27T15:20:21.000000Z"}, {"uuid": "c854a499-9446-4a14-a968-c39f3b55765e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-53375", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113585493417346973", "content": "", "creation_timestamp": "2024-12-02T22:04:48.173301Z"}, {"uuid": "be3f645f-e77c-45c5-9dfc-6f3b1a35c432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "https://bsky.app/profile/sakaijjang.bsky.social/post/3leozt2meq22b", "content": "", "creation_timestamp": "2025-01-01T16:57:55.205832Z"}, {"uuid": "75192180-c6a8-4378-b396-ee99b0f3450d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "efee2be2-5f5b-428d-8f28-91a2d3881d4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "c0b29779-f35f-442f-8091-11ea4fbb4b8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53375", "type": "seen", "source": "https://threatintel.cc/2025/11/27/botnet-takes-advantage-of-aws.html", "content": "", "creation_timestamp": "2025-11-27T11:52:43.000000Z"}]}