{"vulnerability": "cve-2024-3130", "sightings": [{"uuid": "261872a2-8523-4f9d-a350-94a5218f8c86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31309", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6990", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)\nURL\uff1ahttps://github.com/lockness-Ko/CVE-2024-27316\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-09T08:14:27.000000Z"}, {"uuid": "653db60c-b39e-4838-acd5-0d5318a92f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31309", "type": "seen", "source": "https://t.me/arpsyndicate/4585", "content": "#ExploitObserverAlert\n\nCVE-2024-31309\n\nDESCRIPTION: Exploit Observer has 21 entries in 6 file formats related to CVE-2024-31309. HTTP/2 CONTINUATION\u00a0DoS attack can cause Apache Traffic Server to consume more resources on the server.\u00a0 Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are\u00a0affected.  Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute. \u00a0ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.7065795", "creation_timestamp": "2024-04-12T10:05:59.000000Z"}, {"uuid": "fb476ffa-367d-4615-a4e2-f9cc79aa06f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3130", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3130\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Hard-coded Credentials\u00a0in CoolKit eWeLlink app are before 5.4.x on Android and IOS allows local attacker to\u00a0unauthorized access to sensitive data via Decryption algorithm and key obtained after decompiling app\n\n\n\ud83d\udccf Published: 2024-04-01T09:13:53.082Z\n\ud83d\udccf Modified: 2025-03-12T16:46:05.674Z\n\ud83d\udd17 References:\n1. https://ewelink.cc/security-advisories-and-notices/", "creation_timestamp": "2025-03-12T17:41:41.000000Z"}, {"uuid": "f24eeca9-3dee-42f9-8495-86f6f21cf3bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31309", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1998", "content": "CVE-2024-27316 \u0410\u0442\u0430\u043a\u0430 \u043d\u0430 http/2\n*\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n*\n\u041a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e CVE-2024-27316  \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 CVE:\nCVE-2024-30255 (untested)\nCVE-2024-31309 (untested)\nCVE-2024-28182 (untested) \nCVE-2024-2653 (untested)\nCVE-2024-27919 (untested)\n*\nUsage:\ngo build\n./cve-2024-27316 -t 127.0.0.1:80 -p http -i 8192\n./cve-2024-27316 -t 127.0.0.1:443 -p https -i 8192\n*\nPOC exploit", "creation_timestamp": "2024-04-09T15:41:27.000000Z"}]}