{"vulnerability": "cve-2024-5768", "sightings": [{"uuid": "82065849-c4d8-4bc2-a067-5f5606e1bb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57681", "type": "seen", "source": "Telegram/77E0Xb0mirszFSlHS00pPhDxhAknrocbtWEGOdnkPzi4-j9X", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "b2d7d0f4-6c08-4697-acfe-c195423f6a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57687", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1129", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57687\n\ud83d\udd39 Description: An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"Cookie\" GET request parameter.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T13:40:31.733362\n\ud83d\udd17 References:\n1. https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/Command%20Injection.pdf", "creation_timestamp": "2025-01-10T14:05:21.000000Z"}, {"uuid": "14ea34f0-b29f-4d31-81a0-1924b18de64a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57686", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1128", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57686\n\ud83d\udd39 Description: A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"pagetitle\" parameter.\n\ud83d\udccf Published: 2025-01-10T00:00:00\n\ud83d\udccf Modified: 2025-01-10T13:48:50.336293\n\ud83d\udd17 References:\n1. https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/Reflected%20Cross%20Site%20Scripting.pdf", "creation_timestamp": "2025-01-10T14:05:15.000000Z"}, {"uuid": "033ba8f5-5dfb-4427-94ba-8000efef7b0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57682", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839610004775264", "content": "", "creation_timestamp": "2025-01-16T19:09:56.493220Z"}, {"uuid": "18f93679-29c6-45f8-a7cb-09a6c5952515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57683", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839610018257257", "content": "", "creation_timestamp": "2025-01-16T19:09:56.969934Z"}, {"uuid": "20c1cddc-f6d5-424e-bf0c-5b2d82cf1fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuyk4bfya2n", "content": "", "creation_timestamp": "2025-01-16T19:16:06.033664Z"}, {"uuid": "f05c84c4-d863-428d-a608-44edb1965a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57681", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuyk6mlm62r", "content": "", "creation_timestamp": "2025-01-16T19:16:08.052386Z"}, {"uuid": "59b02138-b728-4a2b-a718-dd2c88820744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57682", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuykbcnp72f", "content": "", "creation_timestamp": "2025-01-16T19:16:10.864875Z"}, {"uuid": "31c2e075-afa7-4094-b831-f73fcaf8d984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57683", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuykdszlv2e", "content": "", "creation_timestamp": "2025-01-16T19:16:13.884510Z"}, {"uuid": "d35d00d6-0b60-43a5-8666-38004e0f0f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57686", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffexqorks2f", "content": "", "creation_timestamp": "2025-01-10T14:15:52.352974Z"}, {"uuid": "f909f6ef-2896-432c-8f38-def3fe637c6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57686", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804379856253348", "content": "", "creation_timestamp": "2025-01-10T13:50:27.036979Z"}, {"uuid": "ba9a88d4-25e5-4ec7-a2c6-17185a11776b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57687", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffextjndu2k", "content": "", "creation_timestamp": "2025-01-10T14:15:55.556497Z"}, {"uuid": "0ba6e004-1282-45e5-884f-b72a0a447fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57686", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113804843644942146", "content": "", "creation_timestamp": "2025-01-10T15:48:24.075219Z"}, {"uuid": "51c29f07-cdcc-4b49-a09a-778d584e2c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57682", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24fpx7o2g", "content": "", "creation_timestamp": "2025-01-16T19:44:15.081652Z"}, {"uuid": "8fd8a6f7-4c0f-40ed-9cd0-aa4a03562f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57687", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805082149231484", "content": "", "creation_timestamp": "2025-01-10T16:49:15.697434Z"}, {"uuid": "6894bbc3-28f1-45da-9ab8-0e18d89df7f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57683", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24g2ilx2k", "content": "", "creation_timestamp": "2025-01-16T19:44:16.930526Z"}, {"uuid": "f0db9d32-6986-48e8-a9da-1b9013808f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24g6crh2i", "content": "", "creation_timestamp": "2025-01-16T19:44:17.518978Z"}, {"uuid": "c54f8427-bce3-4ef1-8576-aae466751c38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57681", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24gjcg22k", "content": "", "creation_timestamp": "2025-01-16T19:44:19.297059Z"}, {"uuid": "3051276f-feba-4a94-9509-8e47f219c507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113839913452910996", "content": "", "creation_timestamp": "2025-01-16T20:27:06.663506Z"}, {"uuid": "2fe0d020-38ba-42b5-9135-e4d554db24d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113839999054841894", "content": "", "creation_timestamp": "2025-01-16T20:48:53.404132Z"}, {"uuid": "2e5a42fe-5091-430d-b6b4-9fc01535b199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxmzrorxd2j", "content": "", "creation_timestamp": "2025-01-17T20:28:06.304699Z"}, {"uuid": "02b56c8a-d477-4e7c-bb97-7b14b49c3d4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxna6ij3s2y", "content": "", "creation_timestamp": "2025-01-17T20:31:41.141575Z"}, {"uuid": "0c703e8a-0940-4acb-92dc-8ab4902d0b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxndn5m6g2v", "content": "", "creation_timestamp": "2025-01-17T20:33:37.001303Z"}, {"uuid": "89af8da4-8c5c-4767-bdb3-b13793cc9c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxnintcrt22", "content": "", "creation_timestamp": "2025-01-17T20:36:25.419485Z"}, {"uuid": "543ee0f4-3d37-47fd-9c95-d4b276c880f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxnnmaqxq2z", "content": "", "creation_timestamp": "2025-01-17T20:39:11.788351Z"}, {"uuid": "4cce3d18-6aa8-4004-b20d-7d5e0fc45f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxnv4xfcb2h", "content": "", "creation_timestamp": "2025-01-17T20:43:24.300650Z"}, {"uuid": "af4fe847-31c9-44af-b255-40ae098d97a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxny5t3tg2n", "content": "", "creation_timestamp": "2025-01-17T20:45:05.340980Z"}, {"uuid": "66293deb-4d34-4ab4-82cc-45caf6a172f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfxpw3qsvc2z", "content": "", "creation_timestamp": "2025-01-17T21:19:43.970423Z"}, {"uuid": "f72a5abf-a35a-4344-b84e-77f5c80da05f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lfzk2xg2ei25", "content": "", "creation_timestamp": "2025-01-18T14:40:24.508382Z"}, {"uuid": "6cbf2cf0-b102-4d6b-a98c-ab42ee7f75fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lg24awt2wg25", "content": "", "creation_timestamp": "2025-01-18T20:05:52.637735Z"}, {"uuid": "ea2a9178-6767-4790-8e83-7f092b639246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57685", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lixujraxtj2a", "content": "", "creation_timestamp": "2025-02-25T02:57:53.712707Z"}, {"uuid": "c6aebc6f-4ee3-4fbc-822e-ad0b1910694d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "seen", "source": "Telegram/6Qts6YhihOn28BUVNK77KwjNFuDrmhBUZYPkyP0ElcibZU6M", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "828ae09f-0d07-42ef-a861-45a5c9940941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57685", "type": "seen", "source": "https://t.me/cvedetector/18846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57685 - Apache Sparkshop Phar File Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57685 \nPublished : Feb. 24, 2025, 11:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : An issue in sparkshop v.1.1.7 and before allows a remote attacker to execute arbitrary code via a crafted phar file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T02:19:33.000000Z"}, {"uuid": "93019ee8-e379-4e72-aae0-8eb111d6340e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57682", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2002", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57682\n\ud83d\udd39 Description: An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T18:52:07.809675\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/d_status.md", "creation_timestamp": "2025-01-16T18:56:12.000000Z"}, {"uuid": "85aad945-bedd-4197-81dd-cf0ef4ce3d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2001", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57681\n\ud83d\udd39 Description: An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T18:52:08.716973\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2alg.md", "creation_timestamp": "2025-01-16T18:56:11.000000Z"}, {"uuid": "750d488f-326a-42cd-9c76-7ac53b9c7a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1996", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57680\n\ud83d\udd39 Description: An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T18:52:26.336999\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2PortriggerRule.md", "creation_timestamp": "2025-01-16T18:56:04.000000Z"}, {"uuid": "c67e27c3-c7f5-47b1-b7a3-3482617e5a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57683", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2003", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57683\n\ud83d\udd39 Description: An access control issue in the component websURLFilterAddDel of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the filter settings of the device via a crafted POST request.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T18:52:07.036024\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/websURLFilterAddDel.md", "creation_timestamp": "2025-01-16T18:56:12.000000Z"}, {"uuid": "2275455c-8c30-4ff5-931e-033f3dc43b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://t.me/cvedetector/15612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57684 - D-Link DMZ Service Access Control Bypassomaly\", \n  \"Content\": \"CVE ID : CVE-2024-57684 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:17.000000Z"}, {"uuid": "6e2aea8d-fcde-4356-8a73-afaf0f103c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "seen", "source": "https://t.me/cvedetector/15608", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57680 - D-Link 816A2 Unauthenticated Port Triggers Access Control Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-57680 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:11.000000Z"}, {"uuid": "931439ff-81ea-4b0a-a730-1c941214a0aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57681", "type": "seen", "source": "https://t.me/cvedetector/15609", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57681 - D-Link Form2alg.cgi Unauthenticated Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57681 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:15.000000Z"}, {"uuid": "d8fc6d40-369a-4bb2-a928-7b62d6671ce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57686", "type": "seen", "source": "https://t.me/cvedetector/14956", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57686 - PHPGurukul Land Record System Cross Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57686 \nPublished : Jan. 10, 2025, 2:15 p.m. | 35\u00a0minutes ago \nDescription : A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"pagetitle\" parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T16:20:24.000000Z"}, {"uuid": "10a1b972-d5f4-4635-a619-a9f906e8b525", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57687", "type": "seen", "source": "https://t.me/cvedetector/14957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57687 - PHPGurukul Land Record System OS Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-57687 \nPublished : Jan. 10, 2025, 2:15 p.m. | 35\u00a0minutes ago \nDescription : An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"Cookie\" GET request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T16:20:25.000000Z"}, {"uuid": "6337123c-a1d2-435b-86b8-f81b6c805cd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuykgbpga2b", "content": "", "creation_timestamp": "2025-01-16T19:16:16.046514Z"}, {"uuid": "a269471a-18d8-4cda-9871-8e16bec80fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839669018065257", "content": "", "creation_timestamp": "2025-01-16T19:24:57.098545Z"}, {"uuid": "92807723-9b38-4fd3-8e3e-d9a5f26a4092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57687", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffjvbdfk62i", "content": "", "creation_timestamp": "2025-01-10T15:43:58.028220Z"}, {"uuid": "a734627e-6b77-4231-a269-3a4a2f9dfbbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57686", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffjvbqdl72h", "content": "", "creation_timestamp": "2025-01-10T15:43:58.742313Z"}, {"uuid": "32e854de-2eba-47b9-9969-5980386f111a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfv24fljrm2q", "content": "", "creation_timestamp": "2025-01-16T19:44:14.415941Z"}, {"uuid": "000ea8ce-faf6-46af-a5ae-1132f596f236", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57684", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2004", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57684\n\ud83d\udd39 Description: An access control issue in the component formDMZ.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the DMZ service of the device via a crafted POST request.\n\ud83d\udccf Published: 2025-01-16T00:00:00\n\ud83d\udccf Modified: 2025-01-16T18:52:05.736078\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/formDMZ.md", "creation_timestamp": "2025-01-16T18:56:13.000000Z"}, {"uuid": "f2ddc4c4-67b1-4e71-a846-60840dad35d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57683", "type": "seen", "source": "https://t.me/cvedetector/15611", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57683 - D-Link Web-Enabled Router: Unauthenticated Filter Settings Tampering\", \n  \"Content\": \"CVE ID : CVE-2024-57683 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : An access control issue in the component websURLFilterAddDel of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the filter settings of the device via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:16.000000Z"}, {"uuid": "ccec34ce-43a3-4b6b-8698-18666a41b01a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57682", "type": "seen", "source": "https://t.me/cvedetector/15610", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57682 - D-Link D-Status ASP Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-57682 \nPublished : Jan. 16, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to access sensitive information via a crafted POST request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T21:15:15.000000Z"}, {"uuid": "8f51f241-ec5a-4a6b-80fa-0201dccd1e58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57680", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839609956562737", "content": "", "creation_timestamp": "2025-01-16T19:09:55.856604Z"}, {"uuid": "9876e503-cfd3-41a8-8f75-6e24e40b60a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57681", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839609989550745", "content": "", "creation_timestamp": "2025-01-16T19:09:56.360758Z"}, {"uuid": "593f1ddf-f282-412f-a970-2000ec5f7a75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57687", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113804356594065667", "content": "", "creation_timestamp": "2025-01-10T13:44:32.236217Z"}]}