{"vulnerability": "cve-2020-8007", "sightings": [{"uuid": "af372842-9cb7-412d-835d-5201a1d3381b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8007", "type": "seen", "source": "https://t.me/cvedetector/10159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-8007 - Circontrol Raption EV Charger Pwrstudio OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2020-8007 \nPublished : Nov. 8, 2024, 5:15 a.m. | 40\u00a0minutes ago \nDescription : The pwrstudio web application of EV Charger (in the server in Circontrol Raption through 5.6.2) is vulnerable to OS command injection via three fields of the configuration menu for ntpserver0, ntpserver1, and pingip. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-08T07:09:25.000000Z"}, {"uuid": "2e3664d9-bc50-47c4-aaf4-94a71b5bd4bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8007", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113445399536996829", "content": "", "creation_timestamp": "2024-11-08T04:17:02.071838Z"}, {"uuid": "de964c17-513b-4bdc-877a-9d48dbbb57d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8007", "type": "seen", "source": "https://t.me/ctinow/213095", "content": "https://ift.tt/Ztpwfoe\nCircontrol EV Charger vulnerabilities (CVE-2020-8006, CVE-2020-8007)", "creation_timestamp": "2024-03-27T17:32:01.000000Z"}]}