{"vulnerability": "CVE-2024-5701", "sightings": [{"uuid": "7f9181a3-14e5-439b-8b63-6eb3a026678d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57012", "type": "seen", "source": "https://t.me/cvedetector/15504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57012 - TOTOLINK X5000R Remote OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57012 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"week\" parameter in setScheduleCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:19:01.000000Z"}, {"uuid": "c32a4d41-e863-47c1-895d-7f5f6fd58ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57011", "type": "seen", "source": "https://t.me/cvedetector/15503", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57011 - TOTOLINK X5000R OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57011 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"minute\" parameters in setScheduleCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:19:01.000000Z"}, {"uuid": "5f83a53d-8d8c-47b4-b59b-e295aeda1719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57019", "type": "seen", "source": "https://t.me/cvedetector/15501", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57019 - TOTOLINK X5000R OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57019 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"limit\" parameter in setVpnAccountCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:56.000000Z"}, {"uuid": "f8b9b261-5489-4dbc-a506-f3b0f8971cd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57017", "type": "seen", "source": "https://t.me/cvedetector/15499", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57017 - TOTOLINK X5000R OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57017 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"pass\" parameter in setVpnAccountCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:54.000000Z"}, {"uuid": "034ae5e4-6b1d-470e-bab9-0096fb780f07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57013", "type": "seen", "source": "https://t.me/cvedetector/15500", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57013 - TOTOLINK X5000R Remote OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57013 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"switch\" parameter in setScheduleCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:55.000000Z"}, {"uuid": "6a7a6bcc-b04d-421e-a0af-fc5876ab11a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57015", "type": "seen", "source": "https://t.me/cvedetector/15498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57015 - TOTOLINK X5000R Remote Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57015 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"hour\" parameter in setScheduleCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:53.000000Z"}, {"uuid": "b5819bb7-1b95-4ae8-a407-55a3a2f76046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57016", "type": "seen", "source": "https://t.me/cvedetector/15497", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57016 - TOTOLINK X5000R OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57016 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"user\" parameter in setVpnAccountCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:52.000000Z"}, {"uuid": "9748bb49-9e32-4057-8d25-f3ead0f54855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57014", "type": "seen", "source": "https://t.me/cvedetector/15496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57014 - TOTOLINK X5000R Unauthenticated OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57014 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"recHour\" parameter in setScheduleCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:18:50.000000Z"}, {"uuid": "6189e81d-1548-401f-b3d8-a23cac4e151e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57019", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113839056303799373", "content": "", "creation_timestamp": "2025-01-16T16:49:08.993884Z"}, {"uuid": "ed2e2ba6-f9f0-46c2-947d-c227c89d6fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57011", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.015152Z"}, {"uuid": "4b7c20f8-2396-4eed-a03b-becbd6bfb3c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57013", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.089169Z"}, {"uuid": "fe787e33-c2ce-49e4-b97a-1f380c87fd2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57015", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.153922Z"}, {"uuid": "6521e1b5-1b44-436a-913a-610f423a1781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57017", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.216152Z"}, {"uuid": "cb69e1fd-f374-4ec2-809b-c2d76cf224c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57019", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.280806Z"}, {"uuid": "4e2cf80c-1fca-40ef-acc1-c7dd939a84fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57012", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.055251Z"}, {"uuid": "5d45fefb-0f9f-401d-a6d0-d61c1ab6c296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57014", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.122432Z"}, {"uuid": "ba48d1c2-77ad-4962-9e36-dec368f06099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57016", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.185365Z"}, {"uuid": "e1fd1c6c-ef9e-46f6-b804-2862ad99061f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57018", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113833769317315493", "content": "", "creation_timestamp": "2025-01-15T18:24:35.247728Z"}, {"uuid": "67724e32-d120-4211-8184-a7b287eec39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57011", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7789", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57011\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"minute\" parameters in setScheduleCfg.\n\ud83d\udccf Published: 2025-01-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-17T16:36:55.357Z\n\ud83d\udd17 References:\n1. https://www.totolink.net/\n2. https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setScheduleCfg/setScheduleCfg.md", "creation_timestamp": "2025-03-17T16:47:24.000000Z"}, {"uuid": "4ad9c50d-8410-444e-ac63-ee41f06ab6bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57011", "type": "seen", "source": "Telegram/G2923xkOQkMB60cliUi60pEycippd2kOVIafZYbTkrvyqR4_", "content": "", "creation_timestamp": "2025-03-10T19:39:12.000000Z"}, {"uuid": "640e832b-ccb8-4a74-a91c-5ea75b7352c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57012", "type": "seen", "source": "Telegram/GGp5ndE6ms-xz2qaarxMCyVL1jftQ7n4sy_ncJ1vD7kKT9nC", "content": "", "creation_timestamp": "2025-03-10T19:39:12.000000Z"}, {"uuid": "1adbea7a-b2bb-4733-8ed1-08dcfabeda75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57013", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbeb53ed2c", "content": "", "creation_timestamp": "2025-01-15T17:15:54.049261Z"}, {"uuid": "da056c4c-44c4-4326-b021-045f448d1e5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57014", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbedcd6n2j", "content": "", "creation_timestamp": "2025-01-15T17:15:56.079069Z"}, {"uuid": "51360563-78de-4177-9fbd-7537e90c08e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57015", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbefvyom2e", "content": "", "creation_timestamp": "2025-01-15T17:15:58.942816Z"}, {"uuid": "cff3b9ae-c2b8-48d7-8031-a6f5d818d39f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57018", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbenhnd52f", "content": "", "creation_timestamp": "2025-01-15T17:16:06.887770Z"}, {"uuid": "64a2bd5f-0b59-466a-ad14-c6a8d0d7290f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57016", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsga7wzc72i", "content": "", "creation_timestamp": "2025-01-15T18:43:07.820807Z"}, {"uuid": "79232c92-6dc5-450e-9b1f-907c0fe7d088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57017", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsgaa7nnx2i", "content": "", "creation_timestamp": "2025-01-15T18:43:08.530440Z"}, {"uuid": "171359b7-cd24-4df6-9548-3ad5f4e36df7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57011", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113838817645038283", "content": "", "creation_timestamp": "2025-01-16T15:48:38.595463Z"}, {"uuid": "18a57ff5-c277-4357-b243-fa698ca620b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57012", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113838817720364110", "content": "", "creation_timestamp": "2025-01-16T15:48:38.663447Z"}, {"uuid": "a2e404aa-35a5-4eeb-8e7b-ff63fcb05339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57014", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113838817832041380", "content": "", "creation_timestamp": "2025-01-16T15:48:38.730126Z"}, {"uuid": "b461fef6-6354-4018-9f13-7ca0a76dccf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57015", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113838817896358460", "content": "", "creation_timestamp": "2025-01-16T15:48:38.812785Z"}, {"uuid": "4e319759-c7fd-44c8-9507-34eaf5678729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57013", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113838817770485112", "content": "", "creation_timestamp": "2025-01-16T15:48:39.184975Z"}, {"uuid": "f98fb284-a571-48d3-80ef-6e69b170ced2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57016", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113838817963443986", "content": "", "creation_timestamp": "2025-01-16T15:48:39.564017Z"}, {"uuid": "54dfc8ce-695e-49ab-bb4a-ed32c61e2bfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57011", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbe4kprd2c", "content": "", "creation_timestamp": "2025-01-15T17:15:49.173169Z"}, {"uuid": "9667bbea-e321-431e-b362-9837a30d5490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57012", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbe6qwtn2j", "content": "", "creation_timestamp": "2025-01-15T17:15:51.349240Z"}, {"uuid": "2a4de73f-8659-4348-9226-cf69bc53140c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57016", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1794", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57016\n\ud83d\udd39 Description: TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"user\" parameter in setVpnAccountCfg.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T16:49:03.766983\n\ud83d\udd17 References:\n1. https://www.totolink.net/\n2. https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setVpnAccountCfg/setVpnAccountCfg.md", "creation_timestamp": "2025-01-15T16:54:36.000000Z"}, {"uuid": "32eea5e5-111f-4f47-a787-9bffbf68da14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57017", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1793", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57017\n\ud83d\udd39 Description: TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"pass\" parameter in setVpnAccountCfg.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T16:49:23.964301\n\ud83d\udd17 References:\n1. https://www.totolink.net/\n2. https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setVpnAccountCfg/setVpnAccountCfg.md", "creation_timestamp": "2025-01-15T16:54:35.000000Z"}, {"uuid": "068c497f-960c-4f9e-89c8-a992ab711479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57018", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57018\n\ud83d\udd39 Description: TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"desc\" parameter in setVpnAccountCfg.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T16:49:48.207118\n\ud83d\udd17 References:\n1. https://www.totolink.net/\n2. https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setVpnAccountCfg/setVpnAccountCfg.md", "creation_timestamp": "2025-01-15T16:54:34.000000Z"}, {"uuid": "663684f7-0c48-4387-a69e-1a6626b865c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57019", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1790", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57019\n\ud83d\udd39 Description: TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"limit\" parameter in setVpnAccountCfg.\n\ud83d\udccf Published: 2025-01-15T00:00:00\n\ud83d\udccf Modified: 2025-01-15T16:50:16.198867\n\ud83d\udd17 References:\n1. https://www.totolink.net/\n2. https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setVpnAccountCfg/setVpnAccountCfg.md", "creation_timestamp": "2025-01-15T16:54:30.000000Z"}, {"uuid": "160d8bad-a0c6-40ed-8b8a-74861b08c61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57012", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7579", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57012\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"week\" parameter in setScheduleCfg.\n\ud83d\udccf Published: 2025-01-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-14T15:34:24.788Z\n\ud83d\udd17 References:\n1. https://www.totolink.net/\n2. https://github.com/tiger5671/Vulnerabilities/blob/main/TOTOLINK%20X5000R/setScheduleCfg/setScheduleCfg.md", "creation_timestamp": "2025-03-14T15:43:33.000000Z"}, {"uuid": "d8373cbd-78ee-4f57-839d-492645691676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57018", "type": "seen", "source": "https://t.me/cvedetector/15506", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57018 - TOTOLINK X5000R OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57018 \nPublished : Jan. 15, 2025, 5:15 p.m. | 39\u00a0minutes ago \nDescription : TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the \"desc\" parameter in setVpnAccountCfg. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T19:19:03.000000Z"}, {"uuid": "349c73a4-51da-4659-9b20-5d7d3ebe8c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57015", "type": "seen", "source": "Telegram/_fM4aHJc6KrnK0fGX0xaPUvoVs-EGI4S5t5DXYTz1RFYZhbR", "content": "", "creation_timestamp": "2025-03-10T19:39:13.000000Z"}, {"uuid": "5805f487-f5c0-4bc8-ac25-0bc407de3cc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57014", "type": "seen", "source": "Telegram/DZ1xC_R2aqZsCVwszW40-6eWOHo_bWT-NvAzOIf1-wY6_-la", "content": "", "creation_timestamp": "2025-03-10T19:39:13.000000Z"}, {"uuid": "590f51e6-837b-4335-bff9-9687e2b64b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57013", "type": "seen", "source": "Telegram/c_70_hYf0IEnv7_mxuR0VHxpDssQRx5qTXme6CmwCFMFYwx7", "content": "", "creation_timestamp": "2025-03-10T19:39:13.000000Z"}, {"uuid": "b3645931-c502-4b2c-8768-2eaeee34ec16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57016", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbeiujfh2p", "content": "", "creation_timestamp": "2025-01-15T17:16:02.141649Z"}, {"uuid": "5f6e670d-02d9-4743-bc4b-2715d3d6d66e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57017", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbel7etn2j", "content": "", "creation_timestamp": "2025-01-15T17:16:04.436992Z"}, {"uuid": "b01cac6a-b0ce-45ff-a34c-bf6479946840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57019", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfsbepyo4d2c", "content": "", "creation_timestamp": "2025-01-15T17:16:09.390196Z"}, {"uuid": "f987fd29-0677-4640-a88f-87065fc6dd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57018", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113839056252478093", "content": "", "creation_timestamp": "2025-01-16T16:49:07.791366Z"}, {"uuid": "3411bde9-e8ad-4833-966a-7158f29e4953", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57017", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113839056184176151", "content": "", "creation_timestamp": "2025-01-16T16:49:08.100804Z"}, {"uuid": "d880ebe5-6ffc-4f06-b73b-044356fa6df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57019", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsgaailm62e", "content": "", "creation_timestamp": "2025-01-15T18:43:09.563999Z"}]}