{"vulnerability": "cve-2023-38861", "sightings": [{"uuid": "105c5ca9-bf5a-46ef-a213-54beaaaaa728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-38861", "type": "seen", "source": "https://t.me/cibsecurity/68571", "content": "\u203c CVE-2023-38861 \u203c\n\nAn issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-15T22:30:47.000000Z"}, {"uuid": "2e3a298b-b939-4bdb-815a-6bc924ea0353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-38861", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1014", "content": "MultiWavlink WL-WN575A3 , COMFAST CF-XR11 - Command Injection \nPOC : https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11\nPOC : https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK\nCVE LIST  : CVE-2023-38861 , CVE-2023-38865 . CVE-2023-38863 , CVE-2023-38864 , CVE-2023-38866 , CVE-2023-38862", "creation_timestamp": "2024-02-10T14:19:12.000000Z"}]}