{"vulnerability": "CVE-2024-53691", "sightings": [{"uuid": "107d95bf-054b-45a5-b64c-f860fa0603db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2872", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53691\n\ud83d\udd39 Description: A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later\n\ud83d\udccf Published: 2024-12-06T16:34:54.018Z\n\ud83d\udccf Modified: 2025-01-24T04:55:42.067Z\n\ud83d\udd17 References:\n1. https://www.qnap.com/en/security-advisory/qsa-24-28", "creation_timestamp": "2025-01-24T05:03:34.000000Z"}, {"uuid": "64dcb420-98e5-4692-a9b7-500f113cdaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://t.me/cvedetector/12248", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53691 - A link following vulnerability has been reported t\", \n  \"Content\": \"CVE ID : CVE-2024-53691 \nPublished : Dec. 6, 2024, 5:15 p.m. | 35\u00a0minutes ago \nDescription : A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.  \n  \nWe have already fixed the vulnerability in the following versions:  \nQTS 5.1.8.2823 build 20240712 and later  \nQTS 5.2.0.2802 build 20240620 and later  \nQuTS hero h5.1.8.2823 build 20240712 and later  \nQuTS hero h5.2.0.2802 build 20240620 and later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T18:58:13.000000Z"}, {"uuid": "10d01350-4666-4eb9-b96f-b35367128500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/349", "content": "https://github.com/C411e/CVE-2024-53691\n\nCVE-2024-53691\n#github #exploit", "creation_timestamp": "2025-01-15T17:18:36.000000Z"}, {"uuid": "ae0d1a19-3f6b-4d45-9985-e7f029db9dc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "https://t.me/haj3imad/431", "content": "https://github.com/C411e/CVE-2024-53691\n\nCVE-2024-53691\n#github #exploit", "creation_timestamp": "2025-01-15T17:26:46.000000Z"}, {"uuid": "692d787e-51bd-4a45-ae54-47d6dc2a0a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/elhackernet.extwitter.link/post/3lg3klrxdd226", "content": "", "creation_timestamp": "2025-01-19T09:55:07.962813Z"}, {"uuid": "5c570a97-2bd4-4ba3-ae71-c3a290e438c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lg5b6mmpzc2m", "content": "", "creation_timestamp": "2025-01-20T02:12:02.733635Z"}, {"uuid": "276da64c-3fbe-4d5f-81c0-4e53d34f0927", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://threatintel.cc/2025/01/20/poc-exploit-released-for-qnap.html", "content": "", "creation_timestamp": "2025-01-20T11:30:26.000000Z"}, {"uuid": "51ea2170-0290-402f-b8d5-65968421dc3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lguxw5zqx72e", "content": "", "creation_timestamp": "2025-01-29T12:30:09.292161Z"}, {"uuid": "16bfc57b-d38a-448a-8f98-d4b50306c88e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "Telegram/ycMWZ5EdqiWon2lWkuZzh1qRhqzOeYjmsdC2JSaGEmKWMXA", "content": "", "creation_timestamp": "2025-01-13T16:00:09.000000Z"}, {"uuid": "6dbec5b4-d2c4-41a4-9cf9-e913c8d87d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113606912018934112", "content": "", "creation_timestamp": "2024-12-06T16:51:47.103000Z"}, {"uuid": "ceb06f72-9c02-4e77-823e-301abcd8c5b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113611087069960768", "content": "", "creation_timestamp": "2024-12-07T10:33:33.128984Z"}, {"uuid": "716253e9-3534-4a45-8e34-6841d909bb1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfvvo5cqis2w", "content": "", "creation_timestamp": "2025-01-17T03:57:24.337797Z"}, {"uuid": "923032a8-92be-465d-8267-484d0e043e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11684", "content": "#exploit\n1. CVE-2024-53691:\nQNAP QTS/QuTS RCE\nhttps://github.com/C411e/CVE-2024-53691\n\n2. CVE-2024-49848:\nQualcomm adsprpc driver bug\nhttps://project-zero.issues.chromium.org/issues/42451725", "creation_timestamp": "2025-01-20T12:38:51.000000Z"}, {"uuid": "a0346afd-8374-4e52-97f5-3aa15c9213f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/netalexx.bsky.social/post/3lfvw3wbw4k2j", "content": "", "creation_timestamp": "2025-01-17T04:05:06.078646Z"}, {"uuid": "b7eab106-e1f2-4adf-a6ba-da549b634c23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-53691", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfvwuek6ds2m", "content": "", "creation_timestamp": "2025-01-17T04:18:42.547355Z"}, {"uuid": "7a522f73-4058-4ba2-82ea-78b9823fe3fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfvzrdo7rt2x", "content": "", "creation_timestamp": "2025-01-17T05:10:41.967581Z"}, {"uuid": "86be0200-eb91-428b-81ee-f662e2aff803", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53691", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113844583737315788", "content": "", "creation_timestamp": "2025-01-17T16:14:49.648652Z"}]}