{"vulnerability": "cve-2022-30075", "sightings": [{"uuid": "040028a6-a761-4aba-aacf-36ffb37893b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/malwar3s/5", "content": "https://github.com/NextSecurity/CVE-2022-30075", "creation_timestamp": "2023-02-25T05:20:07.000000Z"}, {"uuid": "01a0c604-5afc-468d-86fc-afcc57a37338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/308", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0438\u0432\u0435\u0434\u0443 cve \u0443 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f linksys \u0438 Tp-Link\n\n\u0414\u043b\u044f \u0442\u0435\u0445 \u043a\u0442\u043e \u043d\u0435 \u0437\u043d\u0430\u0435\u0442 linksys \u044d\u0442\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043c\u0430\u043b\u044b\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0438 \u0434\u043e\u043c\u0430. \u041e\u043d\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u044f\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u043e\u043d\u0446\u0435\u043d\u0442\u0440\u0430\u0442\u043e\u0440\u044b, \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b, \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043a\u0430\u0440\u0442\u044b. \n\n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 \u043a\u043e\u043c\u043c\u0443\u0442\u0430\u0442\u043e\u0440\u044b \u043e\u0442 linksys \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u0431\u044b\u0441\u0442\u0440\u043e\u0433\u043e \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f  \u0441\u0435\u0442\u0438. \u0424\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 STP \u0438 Storm Control \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0438\u043b\u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043a\u0430\u0431\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0435\u0442\u043b\u0438 linksys \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0435\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u0440\u0442\u043e\u0432, \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0435\u0439 \u043e\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u0435\u0440\u0435\u0434 \u0442\u0435\u043c, \u043a\u0430\u043a \u043e\u043d\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c, \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u0434\u043e\u043b\u0436\u043d\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0431\u044f \u043f\u0435\u0440\u0435\u0434 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435\u0439 \u043b\u044e\u0431\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \n\u0422\u0430\u043a \u043a\u0430\u043a\u0438\u0435 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443 \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f ?\n\n\u041f\u0440\u0438\u0432\u0435\u0434\u0443 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e cve \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0435\u0441\u0442\u044c CVE-2022-38555 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 Linksys E1200 \u043d\u0430 \u043d\u0435\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c poc \u0438\u043b\u0438 CVE-2020-35713 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Linksys RE6500  \u043d\u0430 \u043d\u0435\u0435 \u0442\u043e\u0436\u0435 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  . \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435 \ud83e\ude78\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u043e TP-LINK-  \u044d\u0442\u043e \u0442\u043e\u0436\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a Wi-Fi\u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0434\u043b\u044f \u0434\u043e\u043c\u0430 \u0438 \u043e\u0444\u0438\u0441\u0430 \u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f  . \n\n\u0422\u043e\u0436\u0435 \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0443 \u043f\u0440\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 cve \u0438\u0445 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443  CVE-2022-30075 -  \u0438\u043c\u043f\u043e\u0440\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0439 \u043a\u043e\u043f\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 , \u043d\u0430 \u043d\u0435\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442  \u0438\u043b\u0438   CVE-2022-24355 \u044d\u0442\u043e RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442.\u0435 \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0441\u043e\u0441\u0435\u0434\u043d\u0435\u0439 \u0441\u0435\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 . \u0414\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0434\u043b\u0438\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 \u0438\u0445 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u0441\u0442\u0435\u043a\u043e\u0432\u044b\u0439 \u0431\u0443\u0444\u0435\u0440 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0434\u043b\u0438\u043d\u044b. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 root. \n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043e \u043d\u0435\u0439  \u0442\u044b\u043a\n\n\u0410 \u043d\u0430 \u044d\u0442\u043e\u043c \u0434\u0443\u043c\u0430\u044e \u0432\u0441\u0435 .\n\u0412 \u044d\u0442\u043e\u043c \u043f\u043e\u0441\u0442\u0435 \u043c\u044b \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043b\u0438 \u0432\u0438\u0434\u044b \u0430\u0442\u0430\u043a \u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0432 \u0430\u0440\u0445\u0438\u0432\u0435 \u043d\u0438\u0436\u0435\ud83c\udf1f .\u0412 \u0431\u0443\u0434\u0443\u0449\u0435\u043c \u0431\u0443\u0434\u0443\u0442  \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u0441\u0442\u044b \u043f\u0440\u043e \u0430\u0442\u0430\u043a\u0438\n\n\u0421\u043f\u0430\u0441\u0438\u0431\u043e \u0437\u0430 \u043f\u0440\u043e\u0447\u0442\u0435\u043d\u0438\u0435\u2764\ufe0f\n\u0418 \u043f\u043e\u043c\u043d\u0438 \u0410\u043b\u0438\u0441\u0430 , \u043a\u0440\u043e\u043b\u0438\u0447\u044c\u044f \u043d\u043e\u0440\u0430 \u0435\u0441\u0442\u044c \u0438 \u0432 \u0437\u0430\u0437\u0435\u0440\u043a\u0430\u043b\u044c\u0435 \u043f\u043e \u044d\u0442\u043e\u043c\u0443 \u0441\u043b\u0435\u0434\u0443\u0439 \u0437\u0430 \u043a\u0440\u043e\u043b\u0438\u043a\u043e\u043c \u0438 \u0434\u0430\u043b\u044c\u0448\u0435\ud83d\udc07\ud83c\udf80\n#network  #wifi  #attacks #cve #exploit  #dos  #traffic_analysis #router", "creation_timestamp": "2022-11-15T12:28:38.000000Z"}, {"uuid": "b9784287-640c-46dc-9035-0f456d96c4ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/ShadowAIs/881", "content": "\ud83d\udca5CVE-2022-30075 PoC exploit(Authenticated RCE in Tp-Link Routers)\n\n\u26a0\ufe0fAffected Devices:\nTp-Link routers with backup and restore functionality and firmware is older than june 2022\n\nusage: \ntplink.py [-h] -t target -p password [-b] [-r backup_directory] [-c cmd]\n\n@Hackere_co", "creation_timestamp": "2023-05-16T09:21:20.000000Z"}, {"uuid": "227b2407-3df6-47f7-9bd7-4ef23bb008b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "Telegram/Z8ONiabzf6nTQCXJ1F6KkAQ6HqedvI6vpBafZhfNHNSFEQ", "content": "", "creation_timestamp": "2022-06-08T10:34:14.000000Z"}, {"uuid": "52f61ace-5f82-4e8b-9925-2847d3957318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/reconshell/1302", "content": "CVE-2022-30075 Tp-Link Authenticated RCE\n\n#CVE-2022-30075 #RCE #Hacking #WiFi #tplink #Malware\n#Exploit #vulnerability #Router #Cybersecurity #CVE\n\nhttps://reconshell.com/cve-2022-30075-tp-link-authenticated-rce/", "creation_timestamp": "2022-06-15T20:48:01.000000Z"}, {"uuid": "49a4011c-5033-4d70-a8f3-cfc052e7cfee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "Telegram/-6uNGbNC58yc2VSDYDbHQCbMqwqoRA3knD2WwHL0m3j0-BI", "content": "", "creation_timestamp": "2022-06-08T17:27:44.000000Z"}, {"uuid": "d76d6be8-4b8f-4fbc-9c00-0bbfd5225919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/intelexch/13883", "content": "https://github.com/aaronsvk/CVE-2022-30075", "creation_timestamp": "2022-06-09T14:00:55.000000Z"}, {"uuid": "97bfaa4d-109b-411d-94c6-80fca44a9c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "Telegram/yrUw7WO0XYjfKPQmwN-b-7XVVm-6h5U49kx01akg-JVmdg", "content": "", "creation_timestamp": "2022-11-23T16:53:07.000000Z"}, {"uuid": "8f62b9b7-59d3-4f80-8743-7875b2463d2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6165", "content": "#exploit\n1. CVE-2022-30075:\nTP-Link Archer AX50 Authenticated RCE\nhttps://github.com/aaronsvk/CVE-2022-30075\n\n2. CVE-2022-1609:\nBash poc for WordPress Weblizar Backdoor\nhttps://github.com/Trhackno/CVE-2022-1609", "creation_timestamp": "2022-06-09T11:07:01.000000Z"}, {"uuid": "d4b69a80-0c6e-4c47-b479-ffd4369d564a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113549907612268148", "content": "", "creation_timestamp": "2024-11-26T15:14:49.069675Z"}, {"uuid": "d302847e-18c9-4a2c-b105-709de95db98a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/790", "content": "CVE-2022-30075 PoC exploit(Authenticated RCE in Tp-Link Routers)\n\nAffected Devices:\nTp-Link routers with backup and restore functionality and firmware is older than june 2022\n\nusage: \ntplink.py [-h] -t target -p password [-b] [-r backup_directory] [-c cmd]", "creation_timestamp": "2022-11-23T13:33:09.000000Z"}, {"uuid": "182676b0-9686-4317-b9f7-f4fa643c51bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/866", "content": "CVE-2022-30075\nAuthenticated Remote Code Execution in Tp-Link Routers\n*\n#exploit # rce #tp-link", "creation_timestamp": "2022-06-08T10:22:55.000000Z"}, {"uuid": "7afdefa9-3ecd-4b3e-830a-e6cd0b514c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "Telegram/XS7-Gj25E74uy6hOuIEjalWLudK2x_wl16ODvM4DJlLtxw", "content": "", "creation_timestamp": "2022-06-08T10:59:46.000000Z"}, {"uuid": "7f1dbc91-8339-417c-b34b-58c8616c1f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/professional_c_h/1841", "content": "\ud83d\udca5CVE-2022-30075 PoC exploit(Authenticated RCE in Tp-Link Routers)\n\n\u26a0\ufe0fAffected Devices:\nTp-Link routers with backup and restore functionality and firmware is older than june 2022\n\nusage: \ntplink.py [-h] -t target -p password [-b] [-r backup_directory] [-c cmd]\n\n\nChannel:\n@Professional_c_h\n@card_crack_hack", "creation_timestamp": "2022-11-23T15:13:45.000000Z"}, {"uuid": "5cc11ccd-81a4-4c88-8d37-6d4e02c732a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "seen", "source": "https://t.me/cibsecurity/44069", "content": "\u203c CVE-2022-30075 \u203c\n\nIn TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-09T07:32:55.000000Z"}, {"uuid": "4666237f-5976-47ff-8256-2d29c036de84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6326", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (June 1-30)\n\nCVE-2022-30190 - Follina exploit\nCVE-2022-26134 - OGNL injection in Atlassian Confluence Server/Data Center\nCVE-2022-26809 - Weakness in a core Windows 7/10/Srv19/22 component (RPC)\nCVE-2022-30075 - TP-Link AX50 Auth RCE\nCVE-2022-23222 - Linux Kernel eBPF LPE\nCVE-2022-32275 - Grafana 8.4.3 allows reading files\nCVE-2022-26937 - Windows NFS NLM Portmap Stack Buffer Overflow\nCVE-2022-23088 - Heap Overflow in FreeBSD Wi-Fi Stack\nCVE-2022-31626 - RCE in PHP &lt;=7.4.29\nCVE-2022-30333 - Dir Traversal in rar", "creation_timestamp": "2024-10-12T06:49:41.000000Z"}, {"uuid": "54a06d12-dcd0-49d1-8eb8-019f5ce26851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/4344", "content": "CVE-2022-30075 PoC exploit (Authenticated RCE in Tp-Link Routers)\n\nusage: \n\ntplink.py [-h] -t target -p password [-b] [-r backup_directory] [-c cmd]\n\nGithub\n\n#POC #tplink #exploit\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:37.000000Z"}, {"uuid": "e7281208-5770-4d7a-80db-55a90ca0c50c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2463", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aPoC exploit for Tp-Link AX50 (CVE-2022-30075)\nURL\uff1ahttps://github.com/aaronsvk/CVE-2022-30075\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-06-07T23:29:20.000000Z"}, {"uuid": "21c32ff1-9d2d-43d8-9de3-e53638373eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/310", "content": "Now here are the cve of linksys and Tp-Link equipment\n\nFor those who do not know linksys is a manufacturer of networking equipment for small offices and homes. They make network hubs, routers, and network cards. \n\nFor example, linksys' managed switches include features for rapid network expansion. The STP and Storm Control protocol features help control planned or unintended cable loops linksys help protect the network with port authentication which requires clients to authenticate themselves before they start working, clients must authenticate themselves before transmitting any data. \nSo what are the vulnerabilities of this equipment ?\n\nHere are some cve \nFor example, there is CVE-2022-38555 it is a buffer overflow vulnerability in Linksys E1200 already has a poc  or CVE-2020-35713 remote pre-authentication code execution in Linksys RE6500 already has an exploit for it too . \nMore details about the attacks in the archive below \ud83e\ude78\n\nNow about TP-LINK - it is also a supplier of Wi-Fi routers for home and office and one of the largest manufacturers of network equipment. \n\nI will also tell you about some cve of their equipment \nFor example CVE-2022-30075  - importing a malicious backup file via web interface can lead to remote code execution due to wrong checks , there is an exploit for it or CVE-2022-24355 this is RCE vulnerability, i.e. it allows intruders in neighboring network to run arbitrary code on router installations . No authentication is required to exploit this vulnerability. The problem arises because there is no proper length check on user data before it is copied to a fixed-length stack buffer. An attacker can use this vulnerability to execute code in a root context. \nRead more about it link\n\nAnd I think that's it .\nIn this post we have analyzed types of attacks and some hardware vulnerabilities. \nRead more in the archive below\ud83c\udf1f .There will be more articles about the attacks in the future.\n\nThank you for reading\u2764\ufe0f\nRemember Alice, there is a rabbit hole in the looking glass, so follow the rabbit \ud83d\udc07\ud83c\udf80\n#network #wifi #attacks #cve #exploit #dos #traffic_analysis #router", "creation_timestamp": "2022-11-09T07:53:43.000000Z"}, {"uuid": "db6ca753-d708-46e6-a9fb-5e2032742cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "Telegram/TImB4WLg9m4sLGXOfrFfePfJsw5eV9JDphaGTzdqtpQzKI4", "content": "", "creation_timestamp": "2026-04-03T21:00:05.000000Z"}, {"uuid": "450717eb-cd02-4cb0-9d72-0886a9faffdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/ShadowAIs/205", "content": "\ud83d\udca5CVE-2022-30075 PoC exploit(Authenticated RCE in Tp-Link Routers)\n\n\u26a0\ufe0fAffected Devices:\nTp-Link routers with backup and restore functionality and firmware is older than june 2022\n\nusage: \ntplink.py [-h] -t target -p password [-b] [-r backup_directory] [-c cmd]\n\n@Hackere_co", "creation_timestamp": "2023-05-16T09:21:20.000000Z"}, {"uuid": "6061c301-4bf0-4f95-8ea5-87fbc6561442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/147822", "content": "{\n  \"Source\": \"https://t.me/documentors\",\n  \"Content\": \"tplink.py 11.9 kB \ud83d\udca5CVE-2022-30075 PoC exploit(Authenticated RCE in Tp-Link Routers) \u26a0\ufe0fAffected Devices: Tp-Link routers with backup and restore functionality and firmware is older than june 2022 usage: tplink.py [-h] -t target -p password [-b] [-r backup_directory] [-c cmd]\", \n  \"author\": \"\u2693\ufe0f\ud835\udd07\ud835\udd2c\ud835\udd20\ud835\udd32\ud835\udd2a\ud835\udd22\ud835\udd2b\ud835\udd31\ud835\udd2c\ud835\udd2f\",\n  \"Detection Date\": \"23 Nov 2022\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 Data Leak monitoring system\ud83d\udd39", "creation_timestamp": "2022-11-23T21:11:31.000000Z"}, {"uuid": "7a8ef5a2-2121-4541-9724-801fbde20a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/659", "content": "CVE-2022-30075\nAuthenticated Remote Code Execution in Tp-Link Routers", "creation_timestamp": "2022-06-24T14:47:51.000000Z"}, {"uuid": "6382ae0c-4018-4bc2-9b9e-1c77eba117f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "published-proof-of-concept", "source": "Telegram/x8wnlbzbPHJ-c6n7zbVaQmPlH0M96VrWoveYB3MDtQoQces", "content": "", "creation_timestamp": "2026-04-03T19:00:11.000000Z"}, {"uuid": "23ec68e7-6eed-4513-a1a3-efd69d9d481a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30075", "type": "seen", "source": "https://t.me/antichat/9884", "content": "Authenticated Remote Code Execution in TP-Link Routers\n\nAffected Devices\n\nIf your TP-Link router has backup and restore functionality and firmware is older than june 2022, it is probably vulnerable.\n\nTested With\n\nTP-Link Archer AX50, other routers may use different format of backups and exploit needs to be modified.\n\nCVE-2022-30075", "creation_timestamp": "2022-06-20T18:00:48.000000Z"}]}