{"vulnerability": "cve-2022-36553", "sightings": [{"uuid": "9966a670-1459-4212-94e4-d91b28abe32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "seen", "source": "https://t.me/cibsecurity/49016", "content": "\u203c CVE-2022-36553 \u203c\n\nHytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-30T02:47:45.000000Z"}, {"uuid": "1d4df01c-1f66-4a51-b944-98ec52e48275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9771", "content": "#exploit\n1. CVE-2023-36003:\nPrivilege escalation using the XAML diagnostics API\nhttps://github.com/m417z/CVE-2023-36003-POC\n\n2. CVE-2023-46474:\nPMB &lt;=7.5.3 - RCE via Unrestricted File Upload\nhttps://github.com/Xn2/CVE-2023-46474\n\n3. CVE-2022-36553:\nHytec Inter HWL-2511-SS Unauthenticated Remote Command Injection\nhttps://github.com/0xNslabs/CVE-2022-36553-PoC", "creation_timestamp": "2024-01-13T04:11:16.000000Z"}, {"uuid": "4a6b380c-3e3c-48fc-8640-eabbf7ea03c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "published-proof-of-concept", "source": "https://t.me/cKure/12202", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.\n\nhttps://github.com/0xNslabs/CVE-2022-36553-PoC", "creation_timestamp": "2024-01-13T08:07:57.000000Z"}, {"uuid": "25697751-8b9b-43e9-b498-9447a54584a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2506", "content": "#exploit\n1. CVE-2023-36003:\nPrivilege escalation using the XAML diagnostics API\nhttps://github.com/m417z/CVE-2023-36003-POC\n\n2. CVE-2023-46474:\nPMB &lt;=7.5.3 - RCE via Unrestricted File Upload\nhttps://github.com/Xn2/CVE-2023-46474\n\n3. CVE-2022-36553:\nHytec Inter HWL-2511-SS Unauthenticated Remote Command Injection\nhttps://github.com/0xNslabs/CVE-2022-36553-PoC", "creation_timestamp": "2024-08-16T09:01:27.000000Z"}, {"uuid": "9ddf7d6b-b622-4758-954c-7fc368775663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-07)", "content": "", "creation_timestamp": "2025-02-07T00:00:00.000000Z"}, {"uuid": "4fa21b41-06d8-405b-99c8-6dd85fd9020a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "36833712-6c00-4067-9fe9-c2552ff5992f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36553", "type": "seen", "source": "MISP/a41d8549-5384-5e1a-8c33-bf88e35b5a0a", "content": "", "creation_timestamp": "2025-10-14T10:31:49.000000Z"}]}