{"vulnerability": "CVE-2024-57684", "sightings": [{"uuid": "2275455c-8c30-4ff5-931e-033f3dc43b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://t.me/cvedetector/15612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57684 - D-Link DMZ Service Access Control Bypassomaly\", \n  \"Content\": \"CVE ID : CVE-2024-57684 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:17.000000Z"}, {"uuid": "6337123c-a1d2-435b-86b8-f81b6c805cd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuykgbpga2b", "content": "", "creation_timestamp": "2025-01-16T19:16:16.046514Z"}, {"uuid": "2fe0d020-38ba-42b5-9135-e4d554db24d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113839999054841894", "content": "", "creation_timestamp": "2025-01-16T20:48:53.404132Z"}, {"uuid": "af4fe847-31c9-44af-b255-40ae098d97a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxny5t3tg2n", "content": "", "creation_timestamp": "2025-01-17T20:45:05.340980Z"}, {"uuid": "66293deb-4d34-4ab4-82cc-45caf6a172f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxpw3qsvc2z", "content": "", "creation_timestamp": "2025-01-17T21:19:43.970423Z"}, {"uuid": "f72a5abf-a35a-4344-b84e-77f5c80da05f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfzk2xg2ei25", "content": "", "creation_timestamp": "2025-01-18T14:40:24.508382Z"}, {"uuid": "6cbf2cf0-b102-4d6b-a98c-ab42ee7f75fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lg24awt2wg25", "content": "", "creation_timestamp": "2025-01-18T20:05:52.637735Z"}, {"uuid": "2e5a42fe-5091-430d-b6b4-9fc01535b199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxmzrorxd2j", "content": "", "creation_timestamp": "2025-01-17T20:28:06.304699Z"}, {"uuid": "02b56c8a-d477-4e7c-bb97-7b14b49c3d4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxna6ij3s2y", "content": "", "creation_timestamp": "2025-01-17T20:31:41.141575Z"}, {"uuid": "0c703e8a-0940-4acb-92dc-8ab4902d0b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxndn5m6g2v", "content": "", "creation_timestamp": "2025-01-17T20:33:37.001303Z"}, {"uuid": "89af8da4-8c5c-4767-bdb3-b13793cc9c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxnintcrt22", "content": "", "creation_timestamp": "2025-01-17T20:36:25.419485Z"}, {"uuid": "543ee0f4-3d37-47fd-9c95-d4b276c880f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxnnmaqxq2z", "content": "", "creation_timestamp": "2025-01-17T20:39:11.788351Z"}, {"uuid": "4cce3d18-6aa8-4004-b20d-7d5e0fc45f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxnv4xfcb2h", "content": "", "creation_timestamp": "2025-01-17T20:43:24.300650Z"}, {"uuid": "000ea8ce-faf6-46af-a5ae-1132f596f236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2004", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57684\n\ud83d\udd39 Description: An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T18:52:05.736078\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/formDMZ.md", "creation_timestamp": "2025-01-16T18:56:13.000000Z"}, {"uuid": "a269471a-18d8-4cda-9871-8e16bec80fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839669018065257", "content": "", "creation_timestamp": "2025-01-16T19:24:57.098545Z"}, {"uuid": "f0db9d32-6986-48e8-a9da-1b9013808f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24g6crh2i", "content": "", "creation_timestamp": "2025-01-16T19:44:17.518978Z"}]}