{"vulnerability": "CVE-2024-5722", "sightings": [{"uuid": "546e60fa-2d68-4da8-b95b-3457c2191b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57226", "type": "seen", "source": "https://t.me/cvedetector/14988", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57226 - Linksys E7350 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57226 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the iface parameter in the vif_enable function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:30.000000Z"}, {"uuid": "3a060514-ce73-444d-a116-345e12ce550c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57225", "type": "seen", "source": "https://t.me/cvedetector/14987", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57225 - Linksys E7350 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57225 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:30.000000Z"}, {"uuid": "1babed1a-bb2a-4ca4-a60e-718a4863f7e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57224", "type": "seen", "source": "https://t.me/cvedetector/14986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57224 - Linksys E7350 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57224 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pin_wps function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:26.000000Z"}, {"uuid": "8c82695b-e547-45b3-bd75-96a4e91b53f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57223", "type": "seen", "source": "https://t.me/cvedetector/14985", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57223 - Linksys E7350 WPS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57223 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_wps_gen_pincode function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:25.000000Z"}, {"uuid": "76c01427-8a05-4db7-a3a3-cc72c74600c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57222", "type": "seen", "source": "https://t.me/cvedetector/14991", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57222 - Linksys E7350 Router Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57222 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_cancel_wps function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:33.000000Z"}, {"uuid": "7fbad20c-7082-4c99-bd3c-f1d75040378b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57228", "type": "seen", "source": "https://t.me/cvedetector/14990", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57228 - Linksys E7350 Remote Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57228 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the iface parameter in the vif_disable function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:32.000000Z"}, {"uuid": "85253cb8-3851-4717-a131-7eabf54a5f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57227", "type": "seen", "source": "https://t.me/cvedetector/14989", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57227 - Linksys E7350 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57227 \nPublished : Jan. 10, 2025, 6:15 p.m. | 19\u00a0minutes ago \nDescription : Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pbc_wps function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T19:41:31.000000Z"}, {"uuid": "c45b9bc8-1e97-41a0-b29e-76e9d9035103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8622", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:44.000000Z"}, {"uuid": "e736597a-e34f-4431-8bf0-0afd6049f96a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3677", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:33.000000Z"}, {"uuid": "8142697d-5314-4ba2-baeb-4376cd45c92c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7299", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:44.000000Z"}, {"uuid": "087c3b56-2e15-4ac6-8569-42a2f3fdd304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57222", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffseo5yjo2k", "content": "", "creation_timestamp": "2025-01-10T18:15:44.515160Z"}, {"uuid": "e6cd209c-98e0-4842-a783-f3b329a00095", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57223", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffseqrvpa2f", "content": "", "creation_timestamp": "2025-01-10T18:15:47.223358Z"}, {"uuid": "7ffe94bf-8418-4f9a-9649-81d0928f92df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57224", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffset4dk22e", "content": "", "creation_timestamp": "2025-01-10T18:15:49.653003Z"}, {"uuid": "1161e6f4-55f5-40e1-938d-f72079bd4992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57225", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffsevmqcc2x", "content": "", "creation_timestamp": "2025-01-10T18:15:52.421583Z"}, {"uuid": "3e303724-08f2-42c0-9e70-c32db98bbc51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57226", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffseyhjb72i", "content": "", "creation_timestamp": "2025-01-10T18:15:55.455180Z"}, {"uuid": "d53da3e1-c443-42b8-8636-ffa0eb82d607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57227", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffsf2u67a2f", "content": "", "creation_timestamp": "2025-01-10T18:15:57.828792Z"}, {"uuid": "045ac530-0d19-408b-b7ab-3417d11c3d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57228", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffsf5njun22", "content": "", "creation_timestamp": "2025-01-10T18:16:01.226147Z"}, {"uuid": "d737d5f0-200f-4d5e-a5e7-778754a48c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57226", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805216590032112", "content": "", "creation_timestamp": "2025-01-10T17:23:14.533670Z"}, {"uuid": "ada1053c-185f-46ce-bdb1-1aee78be033d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57228", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805216618037812", "content": "", "creation_timestamp": "2025-01-10T17:23:14.972913Z"}, {"uuid": "259d8c24-a01c-482c-8380-92ed9e0f2c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57227", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805216604390919", "content": "", "creation_timestamp": "2025-01-10T17:23:15.409980Z"}, {"uuid": "756f2d30-a6ad-47db-909e-3b36f903924c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57224", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1204", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57224\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pin_wps function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:23:39.926224\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_3_apcli_do_enr_pin_wps/README.md", "creation_timestamp": "2025-01-10T18:04:08.000000Z"}, {"uuid": "75d1ecde-838d-4f0b-a1db-e195a45f84fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57223", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1203", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57223\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_wps_gen_pincode function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:25:12.937682\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_6_apcli_wps_gen_pincode/README.md", "creation_timestamp": "2025-01-10T18:04:04.000000Z"}, {"uuid": "78dcb977-80c4-4b88-a57f-cb8b4e0b6795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57222", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1201", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57222\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_cancel_wps function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:27:07.945327\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_5_apcli_cancel_wps/README.md", "creation_timestamp": "2025-01-10T18:03:58.000000Z"}, {"uuid": "74d27401-11fc-43bd-a791-4f44c2ca621c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57226", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1207", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57226\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the iface parameter in the vif_enable function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:19:32.852251\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_2_vif_enable/README.md", "creation_timestamp": "2025-01-10T18:04:25.000000Z"}, {"uuid": "7f5cd72f-7a6f-4889-a536-a8cef54f7884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57225", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1205", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57225\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T17:22:24.258579\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_7_reset_wifi/README.md", "creation_timestamp": "2025-01-10T18:04:10.000000Z"}, {"uuid": "321a462c-67bb-4152-b835-fb72701ffd76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57227", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1992", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57227\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pbc_wps function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-16T17:35:15.350Z\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_4_apcli_do_enr_pbc_wps/README.md", "creation_timestamp": "2025-01-16T17:55:47.000000Z"}, {"uuid": "ba4368a7-071d-4905-a154-50bb86cc3ff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57228", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1995", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57228\n\ud83d\udd39 Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the iface parameter in the vif_disable function.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-16T17:34:17.304Z\n\ud83d\udd17 References:\n1. https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_1_vif_disable/README.md", "creation_timestamp": "2025-01-16T17:55:53.000000Z"}, {"uuid": "26ed7f8e-6ddc-430e-9bca-eb1382328494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/160", "content": "\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Logsign Unified SecOps\n*\nCVE: CVE-2024-5716 to CVE-2024-5722 \u0438 CVE-2024-5716 CVE-2024-5717\n*\nRCE + ByPass  (+ \u0448\u0430\u0431\u043b\u043e\u043d\u044b nuclei)\n*\nPOC exploits", "creation_timestamp": "2024-08-13T07:31:57.000000Z"}, {"uuid": "105e4060-5775-4ef2-8be8-3ad430accc33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/730", "content": "\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Logsign Unified SecOps\n*\nCVE: CVE-2024-5716 to CVE-2024-5722 \u0438 CVE-2024-5716 CVE-2024-5717\n*\nRCE + ByPass  (+ \u0448\u0430\u0431\u043b\u043e\u043d\u044b nuclei)\n*\nPOC exploits", "creation_timestamp": "2024-08-13T07:31:39.000000Z"}, {"uuid": "fed2e3b5-8232-40b4-bb54-c9d9fccaa273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57229", "type": "seen", "source": "https://t.me/cvedetector/24469", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57229 - NETGEAR RAX5 Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57229 \nPublished : May 5, 2025, 5:18 p.m. | 16\u00a0minutes ago \nDescription : NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T20:03:47.000000Z"}, {"uuid": "ac550e04-f350-4f62-9b7c-e6712268945f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57222", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffujglmiw25", "content": "", "creation_timestamp": "2025-01-10T18:54:11.988372Z"}, {"uuid": "bab32e6f-bd43-43ca-a4b8-c0eb0a1332ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57224", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffujhcbdy2h", "content": "", "creation_timestamp": "2025-01-10T18:54:12.820176Z"}, {"uuid": "de8f7f1e-1f72-40db-9b85-e8849d5fb21f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57223", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffujhm52h2y", "content": "", "creation_timestamp": "2025-01-10T18:54:13.832078Z"}, {"uuid": "c0468f9d-536c-4431-b598-fcc7c2d19414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57225", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffujhpksu2r", "content": "", "creation_timestamp": "2025-01-10T18:54:14.336351Z"}, {"uuid": "9bbc540a-c61c-4042-aeee-27ad5e115773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57227", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffujhstaz2k", "content": "", "creation_timestamp": "2025-01-10T18:54:14.803984Z"}, {"uuid": "d00c0177-5148-4577-b105-08ccffb91b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57226", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffujhwg5p2y", "content": "", "creation_timestamp": "2025-01-10T18:54:15.296217Z"}, {"uuid": "7539bb7a-42f3-4956-af37-b494bfdce87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57228", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffuji27af2u", "content": "", "creation_timestamp": "2025-01-10T18:54:15.799288Z"}, {"uuid": "9a5e2aba-3124-4a0a-9ffe-7c32bfa5bd4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57223", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113823246346167439", "content": "", "creation_timestamp": "2025-01-13T21:48:27.960908Z"}, {"uuid": "eae6f4e9-8747-4480-b55c-c022242991a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57224", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113823246403824787", "content": "", "creation_timestamp": "2025-01-13T21:48:28.752175Z"}, {"uuid": "442b0466-3f94-4aa8-b48d-573076797968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57225", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113823246478515367", "content": "", "creation_timestamp": "2025-01-13T21:48:29.797145Z"}, {"uuid": "1cdc0894-0b34-497c-a74d-81e6b00406ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57224", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805250996210556", "content": "", "creation_timestamp": "2025-01-10T17:32:01.290679Z"}, {"uuid": "715a603d-e469-401c-b2d3-9c5444e3a4a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57222", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805250968600872", "content": "", "creation_timestamp": "2025-01-10T17:32:01.384649Z"}, {"uuid": "f5fec0e7-f510-4d89-9e29-d9b90d8dd2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57223", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805250982538059", "content": "", "creation_timestamp": "2025-01-10T17:32:01.339101Z"}, {"uuid": "0e7f0243-4f02-4d47-b912-ecece7724762", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57225", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113805251009888703", "content": "", "creation_timestamp": "2025-01-10T17:32:01.436084Z"}, {"uuid": "285d0a7f-789a-4ac7-9e72-f523da17bf86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/700", "content": "Tools - Hackers Factory \n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/N0rz3/Eyes\n\nA wordlist of API names used for fuzzing web application APIs.\n\nhttps://github.com/chrislockard/api_wordlist\n\nSafeLine - Make your web apps secure\n\nhttps://github.com/chaitin/SafeLine\n\nLogsign Unified SecOps Platform: Detection CVE-2024-5716 to CVE-2024-5722 - Exploiting CVE-2024-5716 and CVE-2024-5717, Proof of Concept (PoC)\n\nhttps://github.com/j4nk3/Logsign-RCE\n\nMDUT (Multiple Database Utilization Tools) is a Chinese database cross platform utilization tool that integrates multiple mainstream database types.Based on the foundation of the predecessors SQLTOOLS, this program was developed (a tribute to SQLTOOLS), which aims to integrate common database utilization methods in one program, breaking the barriers that various database utilization tools require various environments and cause considerable inconvenience. In addition, the tool uses JAVAFx as the GUI operation interface, which is beautiful. At the same time, the program also supports simultaneous operation of multiple databases, each of which is independent of each other, which greatly facilitates the use of network security workers.\n\nhttps://github.com/SafeGroceryStore/MDUT\n\nSearch by Image is a browser extension that makes effortless reverse image searches possible, and comes with support for more than 30 search engines.\n\nhttps://github.com/dessant/search-by-image\n\nUnleashing an Ultimate XSS Polyglot\n\nhttps://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot\n\nBadsectorlabs/sccm-http-looter: Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)''\n\nhttps://github.com/badsectorlabs/sccm-http-looter\n\nStreaming Overseer: A Telegram Monitoring Tool\n\nhttps://github.com/afolivieri/streaming_overseer\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-18T06:23:26.000000Z"}, {"uuid": "4867e959-c387-4f62-aa1a-89c6a064b446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5722", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113528961707886148", "content": "", "creation_timestamp": "2024-11-22T22:27:59.687951Z"}]}