{"vulnerability": "cve-2024-20017", "sightings": [{"uuid": "b94a9721-da3d-4c17-ad32-bc10b05e6131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/783", "content": "CVE-2024-20017  Zero-Click Exploit  Wi-Fi Chipsets\n*\nCVSS 9.8\n*\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440:\n4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways\n*\n\u0421\u0430\u043c Exploit", "creation_timestamp": "2024-09-05T17:02:31.000000Z"}, {"uuid": "18d32c87-2a86-4636-9be0-be0d115e1928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "Telegram/Jyt1hGNIUU-NkjHGxDdukMRofmOFaUizJ8LHge8ixRr1KzA", "content": "", "creation_timestamp": "2024-09-25T15:13:51.000000Z"}, {"uuid": "8e4ab4e5-f1ae-442e-8e66-5c69cfb88a19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/2118", "content": "0-Click exploit in MediaTek Wi-Fi chipsets affects routers and smartphones / Exploiting (CVE-2024-20017) 4 different ways\n\nhttps://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html\n\n#expdev #poc", "creation_timestamp": "2024-09-26T07:57:21.000000Z"}, {"uuid": "f2b2f12a-8d67-45f9-8e18-6f05491ef9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/AzazelNews/690915", "content": "https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/", "creation_timestamp": "2024-09-26T17:13:15.000000Z"}, {"uuid": "4dbca875-57ec-4497-905e-012da8127c69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/850", "content": "\u26a1\ufe0f0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017).\nPublished PoC can be tested even from a smartphone.\n\n#CyberBulletin", "creation_timestamp": "2024-09-23T13:05:12.000000Z"}, {"uuid": "39f1027d-fad6-4c00-91b4-0204269f0cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "Telegram/nNAfpYk7CswGxmscGf4QAk_CQ0SebwvMEjsmCayiePSP9VA", "content": "", "creation_timestamp": "2024-09-25T09:25:49.000000Z"}, {"uuid": "0df49963-07fd-4779-846b-c851c7c575e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/25725", "content": "\u26a1\ufe0f0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017).\nPublished PoC can be tested even from a smartphone.\n\n#CyberBulletin", "creation_timestamp": "2024-09-23T13:30:14.000000Z"}, {"uuid": "4854f09b-7931-41ef-96f7-2bd2391e2309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9148", "content": "4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways\n\nhttps://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html", "creation_timestamp": "2024-09-22T11:15:08.000000Z"}, {"uuid": "8b1d016e-3b63-40ec-b653-5346464f9584", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/196", "content": "\u26a1\ufe0fCVE-2024-20017 (CVSS 9.8): Zero-Click Exploit Discovered in Popular Wi-Fi Chipsets, PoC Published.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:43.000000Z"}, {"uuid": "d3fe8869-7047-42ff-95a4-610b81ddf186", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lf5v7yy6t22s", "content": "", "creation_timestamp": "2025-01-07T14:45:32.257304Z"}, {"uuid": "61e39eb7-a2d2-4a07-8ce5-7629f0456e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "seen", "source": "https://vulnerability.circl.lu/comment/4d12529b-de4a-40f8-85fb-a910c49847c3", "content": "", "creation_timestamp": "2024-09-21T16:21:27.498950Z"}, {"uuid": "44af822e-f645-4a10-a1d6-68038dd5df8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8472", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aexploits for CVE-2024-20017\nURL\uff1ahttps://github.com/mellow-hype/cve-2024-20017\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-07T10:14:33.000000Z"}, {"uuid": "096cec8b-d6bf-4dbd-9530-395107e99c11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13575", "content": "\u2639\ufe0f 4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways.\n\nhttps://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html", "creation_timestamp": "2024-09-01T14:36:12.000000Z"}, {"uuid": "2b513dd1-e8f5-4bad-b352-61b810f22ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "Telegram/OW0jjtCB1nTI_eop3reLPd2d33qEaScm9n-80XTjvKclfg", "content": "", "creation_timestamp": "2024-09-25T10:30:32.000000Z"}, {"uuid": "e17cab44-5838-4d57-98ec-60118e82dc90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1615", "content": "\u2705 0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017) \ud83d\udc7a\n\nsource: https://github.com/mellow-hype/cve-2024-20017", "creation_timestamp": "2024-10-01T05:42:42.000000Z"}, {"uuid": "a89793dd-411f-42a9-b830-b113b54a6faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23675", "content": "\u26a1\ufe0fCVE-2024-20017 (CVSS 9.8): Zero-Click Exploit Discovered in Popular Wi-Fi Chipsets, PoC Published.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:34.000000Z"}, {"uuid": "7f76364c-55b2-41f4-92cf-dee547237bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/zer0day1ab/237", "content": "CVE-2024-20017: mtk wappd RCE exploit for Netgear WAX206\n\nThe vulnerability is a buffer overflow caused by a copy operation that uses a length value taken directly from attacker-controlled packet data without bounds checking.\n\nBlog: https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html", "creation_timestamp": "2024-09-02T20:11:25.000000Z"}, {"uuid": "982fb4be-2bdc-47e3-bc08-a7b576ebd17a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6164", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043d\u0430 3 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c.\n\n\u0414\u0432\u043e\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0437 \u0422\u0435\u043b\u044c-\u0410\u0432\u0438\u0432\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e \u043d\u043e\u0432\u043e\u0439 \u0430\u0442\u0430\u043a\u0435, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0443\u0441\u0442\u0430\u0440\u0435\u0432\u0448\u0438\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b Windows Kerberos. PoC\u00a0\u0442\u0430\u043a\u0436\u0435 \u0438\u043c\u0435\u0435\u0442\u0441\u044f.\n\nZDI \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 CVE-2024-37079, \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 VMWare vCenter, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0438\u044e\u043d\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430.\n\n\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439, \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e, \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 DCERPC \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u0441\u0435\u0440\u0432\u0435\u0440.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u044b.\n\nPatchstack \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 \u0432 \u043f\u043b\u0430\u0433\u0438\u043d\u0435 Wishlist \u0434\u043b\u044f WooCommerce, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c \u043d\u0430\u00a0100 000 \u0441\u0430\u0439\u0442\u0430\u0445.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a Hypr, \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u00a0\u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-20017, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 RCE \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 MediaTek WLAN, \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0435\u0449\u0435 \u0432 \u043c\u0430\u0440\u0442\u0435 2024.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0414\u0438\u0432\u044c\u044f\u043d\u0448\u0443 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2023-29360 \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u043f\u043e\u0442\u043e\u043a\u043e\u0432\u043e\u0439 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 Windows, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0438 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0438\u044e\u043d\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430.\n\n\u041c\u0438\u0445\u0430\u0438\u043b \u0416\u043c\u0430\u0439\u043b\u043e \u0438\u0437 CICADA8 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u00a0\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0440\u0430\u0441\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 Microsoft MSI.\n\nMicrosoft \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0430\u0442\u0430\u043a\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u043d\u0443\u043b\u0435\u0439 \u0432 Chrome \u0438 Windows, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u0435\u0439 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0430. \n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f Chrome \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 \u0432\u044b\u0445\u043e\u0434\u0430 \u0438\u0437 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430, \u0430 \u0437\u0430\u0442\u0435\u043c \u0432 Windows - \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0440\u0443\u0442\u043a\u0438\u0442\u0430 FudModule.\n\n\u041e\u0431\u0435 0-day \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u0430\u0432\u0433\u0443\u0441\u0442\u0430.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u0432\u044f\u0437\u0430\u043b\u0438 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044e \u0441 \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u043e\u0439 APT, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u043a\u0430\u043a Citrine Sleet.", "creation_timestamp": "2024-09-03T18:37:14.000000Z"}, {"uuid": "58a46ef7-25c9-40e4-94d6-93551ee20f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/553", "content": "\u26a1\ufe0fCVE-2024-20017 (CVSS 9.8): Zero-Click Exploit Discovered in Popular Wi-Fi Chipsets, PoC Published.\n\n#CyberBulletin", "creation_timestamp": "2024-09-05T07:08:30.000000Z"}, {"uuid": "79553e13-0c9c-4c96-97e2-01e30531ae25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/248", "content": "#exploit\n1. CVE-2024-20017:\nMediaTek wappd Buffer Overflow\nhttps://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html\n\n2. CVE-2023-41111:\nSamsung Baseband RLC Data Re-Assembly Buffer Overflow\nhttps://labs.taszk.io/blog/post/93_rlc_bof", "creation_timestamp": "2024-09-02T09:10:13.000000Z"}, {"uuid": "979da7dc-de78-4c1a-87a1-994f5a0d0355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/247", "content": "CVE-2024-20017: mtk wappd RCE exploit for Netgear WAX206\n\nThe vulnerability is a buffer overflow caused by a copy operation that uses a length value taken directly from attacker-controlled packet data without bounds checking.\n\nBlog: https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html", "creation_timestamp": "2024-09-02T08:42:06.000000Z"}, {"uuid": "1895bb79-8f51-404c-807f-6870b4f63f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3457", "content": "0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017).\nPublished PoC can be tested even from a smartphone\nTechnical details: https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html\nPoC: https://github.com/mellow-hype/cve-2024-20017", "creation_timestamp": "2024-09-24T12:05:24.000000Z"}, {"uuid": "b827dcda-3585-4b33-bb97-0fb5204cdefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3397", "content": "CVE-2024-20017: mtk wappd RCE exploit for Netgear WAX206\n\nThe vulnerability is a buffer overflow caused by a copy operation that uses a length value taken directly from attacker-controlled packet data without bounds checking.\n\nBlog: https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html", "creation_timestamp": "2024-09-17T13:29:26.000000Z"}, {"uuid": "d6360408-204b-40f6-ac14-19c04607ed03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "seen", "source": "https://t.me/T_f_s0/551", "content": "0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017)", "creation_timestamp": "2024-09-25T09:21:17.000000Z"}, {"uuid": "6b1850e1-84e3-41f7-8452-b7027569dd5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/T_f_s0/1310", "content": "\u2705 0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017) \ud83d\udc7a\n\nsource: https://github.com/mellow-hype/cve-2024-20017", "creation_timestamp": "2024-10-04T19:06:11.000000Z"}, {"uuid": "601e89d1-a0a0-434c-9656-cc332cfb2465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1540", "content": "0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017)\n\nsource: https://github.com/mellow-hype/cve-2024-20017", "creation_timestamp": "2024-09-25T05:27:31.000000Z"}, {"uuid": "dfdae8e7-70e9-46cd-a1d3-b7eaec421fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "Telegram/La62hIWBFx6SRf12ThAOCQyT3XAkgQuWZ0kvCI8ZyfE", "content": "", "creation_timestamp": "2024-09-05T17:50:10.000000Z"}, {"uuid": "c04e6389-4956-4b60-bf1c-f9bbc50230c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/820", "content": "CVE-2024-20017: mtk wappd RCE exploit for Netgear WAX206\n\nThe vulnerability is a buffer overflow caused by a copy operation that uses a length value taken directly from attacker-controlled packet data without bounds checking.\n\nBlog: https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html", "creation_timestamp": "2025-01-02T02:58:38.000000Z"}, {"uuid": "bc3362df-1169-4f4d-9af7-a031617f6a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "Telegram/yVq8Fj-WNcxvYRSVnO9eBy-rkjK4JgZO4RHc4nh9ATQ8YLY", "content": "", "creation_timestamp": "2024-09-27T18:49:58.000000Z"}, {"uuid": "e95c3d9a-d921-4e2d-b6f8-999eaedf277c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2258", "content": "CVE-2024-20017  Zero-Click Exploit  Wi-Fi Chipsets\n*\nCVSS 9.8\n*\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440:\n4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways\n*\n\u0421\u0430\u043c Exploit", "creation_timestamp": "2024-09-05T15:36:56.000000Z"}, {"uuid": "b7e92682-9a90-4d79-adb4-46bec176c010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "seen", "source": "https://t.me/ctinow/198976", "content": "https://ift.tt/dJRFfh6\nCVE-2024-20017", "creation_timestamp": "2024-03-04T04:31:53.000000Z"}, {"uuid": "f323d9ad-50fa-4cc3-8285-57ae5174e2f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2341", "content": "0-Click exploit discovered in MediaTek Wi-Fi chipsets affects routers and smartphones (CVE-2024-20017).\nPublished PoC can be tested even from a smartphone\nTechnical details: https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html\nPoC: https://github.com/mellow-hype/cve-2024-20017", "creation_timestamp": "2025-03-02T18:20:55.000000Z"}, {"uuid": "6499ddad-d2c9-436e-a9c0-27f2b6058a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3101", "content": "https://github.com/mellow-hype/cve-2024-20017/tree/main\n\nexploits for CVE-2024-20017\n#github #exploit", "creation_timestamp": "2024-09-02T17:45:03.000000Z"}, {"uuid": "b0692bad-6271-4a32-851c-3c6a72a83547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20017", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11069", "content": "#exploit\n1. CVE-2024-20017:\nMediaTek wappd Buffer Overflow\nhttps://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html\n]-&gt; https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html#wrapping-up\n\n2. CVE-2023-41111:\nSamsung Baseband RLC Data Re-Assembly Buffer Overflow\nhttps://labs.taszk.io/blog/post/93_rlc_bof", "creation_timestamp": "2024-09-06T18:12:05.000000Z"}]}