{"vulnerability": "cve-2024-6198", "sightings": [{"uuid": "a7bae132-c7e7-4d3b-bfff-ec7ffdbd9422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-6198", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-f30abf58-ec8d8dbab1928593", "content": "", "creation_timestamp": "2025-05-02T14:28:24.613386Z"}, {"uuid": "64f060c1-6d58-4be7-ae0e-c232d1651484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13411", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-6198\n\ud83d\udd25 CVSS Score: 7.7 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y/R:U/V:C/RE:M/U:Red)\n\ud83d\udd39 Description: The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the\u00a0\u201cSNORE\u201d interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker\nwith access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the\u00a0modem.\n\ud83d\udccf Published: 2025-04-25T13:02:43.673Z\n\ud83d\udccf Modified: 2025-04-25T13:02:43.673Z\n\ud83d\udd17 References:\n1. https://www.onekey.com/resource/security-advisory-rce-on-viasat-modems-cve-2024-6198", "creation_timestamp": "2025-04-25T13:07:28.000000Z"}, {"uuid": "7b1df36a-15db-4741-aad1-92a8b9b41283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lnndb7swbo2b", "content": "", "creation_timestamp": "2025-04-25T13:28:14.271660Z"}, {"uuid": "b79592ee-4a07-4d07-9590-b60dd2af562b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lnndvh7iw52d", "content": "", "creation_timestamp": "2025-04-25T13:39:32.613226Z"}, {"uuid": "61ae71cd-751a-4e2e-a00c-78fad42bba9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114398911743945796", "content": "", "creation_timestamp": "2025-04-25T13:47:44.066299Z"}, {"uuid": "0bee98fd-2565-4a67-a7e7-4fff09bcf47c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114398924910799263", "content": "", "creation_timestamp": "2025-04-25T13:51:05.721550Z"}, {"uuid": "a52fdea7-8cd1-47df-9fa1-ef36de9803a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-6198", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lnppwlhxs72k", "content": "", "creation_timestamp": "2025-04-26T12:20:14.845504Z"}, {"uuid": "ed2746d0-d11d-4f13-a81f-e0429b9bb321", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-6198", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/2adf7552-47cf-4555-af85-af481fbfa04f", "content": "", "creation_timestamp": "2025-05-07T13:26:15.723595Z"}, {"uuid": "26725bb0-20d5-4761-acab-688c9ac7cb9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/2adf7552-47cf-4555-af85-af481fbfa04f", "content": "", "creation_timestamp": "2025-05-07T13:26:15.723595Z"}, {"uuid": "54619e74-8905-4703-ac77-443ffc8c67fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/1136", "content": "CVE-2024-6198: \u0645\u0648\u062f\u0645 \u0647\u0627\u06cc \u0645\u0627\u0647\u0648\u0627\u0631\u0647 \u0627\u06cc Viasat \u0628\u062f\u0648\u0646 \u062f\u0631\u06af\u06cc\u0631\u06cc \u0628\u0647 \u0647\u06a9\u0631\u0647\u0627 \u062a\u0633\u0644\u06cc\u0645 \u0645\u06cc \u0634\u0648\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0647 \u0642\u062f\u0631\u06cc \u0633\u0627\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u062d\u062a\u06cc \u06cc\u06a9 \u0645\u0628\u062a\u062f\u06cc \u0646\u06cc\u0632 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0622\u0646 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f.\n\n\u06a9\u0634\u0641 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631 \u062f\u0631 \u0645\u0648\u062f\u0645\u200c\u0647\u0627\u06cc \u0645\u0627\u0647\u0648\u0627\u0631\u0647\u200c\u0627\u06cc Viasat \u0628\u0627\u0631 \u062f\u06cc\u06af\u0631 \u0634\u06a9\u0646\u0646\u062f\u06af\u06cc \u0627\u062c\u0632\u0627\u06cc \u067e\u0646\u0647\u0627\u0646 \u062f\u0631 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0631\u0627 \u0628\u0631\u062c\u0633\u062a\u0647 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a. \u0645\u062d\u0642\u0642\u0627\u0646 ONEKEY \u0627\u0632 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0627\u0633\u062a\u0627\u062a\u06cc\u06a9 \u062e\u0648\u062f\u06a9\u0627\u0631 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0628\u0627\u06cc\u0646\u0631\u06cc\u00a0\u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u06cc\u06a9 \u0627\u0634\u06a9\u0627\u0644 \u062e\u0637\u0631\u0646\u0627\u06a9\u00a0\u062f\u0631 \u0645\u062f\u0644\u200c\u0647\u0627\u06cc RM4100\u060c RM4200\u060c EM4100\u060c RM5110\u060c RM5111\u060c RG1000\u060c RG1100\u060c EG1000 \u0648 EG1020 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f.\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646\u00a0CVE-2024-6198\u00a0\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0648 \u062f\u0631 \u0645\u0642\u06cc\u0627\u0633 CVSS \u062f\u0627\u0631\u0627\u06cc \u0627\u0645\u062a\u06cc\u0627\u0632 7.7 \u0627\u0633\u062a\u060c \u0631\u0627\u0628\u0637 \u0648\u0628 SNORE \u0631\u0627 \u06a9\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 lighttpd \u062f\u0631 \u067e\u0648\u0631\u062a\u200c\u0647\u0627\u06cc TCP 3030 \u0648 9882 \u0627\u062c\u0631\u0627 \u0645\u06cc\u200c\u0634\u0648\u062f\u060c \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f. \u0645\u062f\u06cc\u0631\u06cc\u062a \u0646\u0627\u062f\u0631\u0633\u062a \u0645\u062a\u063a\u06cc\u0631\u0647\u0627\u06cc REQUEST_METHOD \u0648 REQUEST_URI \u0645\u0646\u062c\u0631 \u0628\u0647 \u0633\u0631\u0631\u06cc\u0632 \u067e\u0634\u062a\u0647 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u062a\u062c\u0632\u06cc\u0647 \u0645\u0633\u06cc\u0631 \u0646\u0627\u0627\u0645\u0646 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0627\u0628\u0639 sscanf \u0645\u06cc\u200c\u0634\u0648\u062f\u060c \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u06a9\u0646\u062a\u0631\u0644 \u0628\u0631 \u062b\u0628\u062a\u200c\u0647\u0627\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u0622\u0648\u0631\u062f.\n\u0637\u0628\u0642 \u06af\u0641\u062a\u0647 \u062a\u06cc\u0645\u060c \u0627\u06cc\u0646 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0631\u0627 \u0645\u06cc \u062a\u0648\u0627\u0646 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u062e\u0627\u0635\u060c \u0645\u0627\u0646\u0646\u062f \u0622\u062f\u0631\u0633 \"192[.]168[.]100[.]1:9882/snore/blackboxes/\u060c \u0648 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0622\u0646 512 \u06a9\u0627\u0631\u0627\u06a9\u062a\u0631 \u062a\u06a9\u0631\u0627\u0631\u06cc\u060c \u067e\u06cc\u0627\u062f\u0647 \u0633\u0627\u0632\u06cc \u06a9\u0631\u062f. \u0639\u0644\u06cc\u0631\u063a\u0645 \u0648\u062c\u0648\u062f \u0645\u062d\u0627\u0641\u0638\u062a \u062f\u0631 \u0642\u0627\u0644\u0628 \u06cc\u06a9 \u067e\u0634\u062a\u0647 \u063a\u06cc\u0631 \u0642\u0627\u0628\u0644 \u0627\u062c\u0631\u0627\u060c \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u0648\u0641\u0642\u06cc\u062a \u0622\u0645\u06cc\u0632 \u0647\u0646\u0648\u0632 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u06a9\u0646\u06cc\u06a9 \u0647\u0627\u06cc ROP (\u0628\u0631\u0646\u0627\u0645\u0647 \u0646\u0648\u06cc\u0633\u06cc \u0628\u0627\u0632\u06af\u0634\u062a \u06af\u0631\u0627) \u0627\u0645\u06a9\u0627\u0646 \u067e\u0630\u06cc\u0631 \u0627\u0633\u062a \u06a9\u0647 \u0627\u0645\u06a9\u0627\u0646 \u0631\u0647\u06af\u06cc\u0631\u06cc \u062c\u0631\u06cc\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0631\u0627 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc \u06a9\u0646\u062f.\n\u0645\u06cc\u0627\u0646\u200c\u0627\u0641\u0632\u0627\u0631 \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u0634\u0627\u0645\u0644 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u06a9\u0645\u062a\u0631 \u0627\u0632 3.8.0.4 \u0628\u0631\u0627\u06cc \u0645\u062f\u0644\u200c\u0647\u0627\u06cc RM4100\u060c RM4200 \u0648 EM4100 \u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u062a\u0627 \u0646\u0633\u062e\u0647 4.3.0.1 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u062f\u06cc\u06af\u0631 \u0627\u0633\u062a. Viasat \u0627\u0635\u0644\u0627\u062d\u0627\u062a\u06cc \u0631\u0627 \u062f\u0631 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c\u0647\u0627\u06cc 3.8.0.4 \u0648 4.3.0.2 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062e\u0648\u062f\u06a9\u0627\u0631 OTA \u062a\u0648\u0632\u06cc\u0639 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0628\u0647 \u0645\u0627\u0644\u06a9\u0627\u0646 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0628\u0631\u0627\u06cc \u062f\u0631\u06cc\u0627\u0641\u062a \u0622\u062e\u0631\u06cc\u0646 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0633\u0641\u062a\u200c\u0627\u0641\u0632\u0627\u0631\u060c \u0645\u0637\u0645\u0626\u0646 \u0634\u0648\u0646\u062f \u06a9\u0647 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc\u0634\u0627\u0646 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0645\u062a\u0635\u0644 \u0627\u0633\u062a \u0648 \u0622\u0646\u200c\u0647\u0627 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0646\u0644 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0628\u0631\u0631\u0633\u06cc \u06a9\u0646\u0646\u062f.\n\u06a9\u0634\u0641 \u06cc\u06a9 \u0646\u0642\u0635 \u062c\u062f\u06cc \u0646\u062a\u06cc\u062c\u0647 \u0646\u0638\u0627\u0631\u062a \u0645\u0639\u0645\u0648\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0644\u062a \u0641\u0631\u0645 ONEKEY \u0628\u0648\u062f. \u0628\u0647 \u06af\u0641\u062a\u0647 \u062a\u06cc\u0645 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a\u06cc\u060c \u0627\u06cc\u0646 \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0686\u0646\u06cc\u0646 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u06cc\u0645\u0646 \u0633\u0627\u0632\u06cc \u0645\u062d\u06cc\u0637 \u0647\u0627\u06cc \u067e\u06cc\u0686\u06cc\u062f\u0647 \u0634\u0628\u06a9\u0647 \u0648 \u0628\u0647\u0628\u0648\u062f \u0634\u0641\u0627\u0641\u06cc\u062a \u062f\u0631 \u0646\u0627\u062d\u06cc\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u062a\u0639\u0628\u06cc\u0647 \u0634\u062f\u0647 \u062a\u0627\u06cc\u06cc\u062f \u0645\u06cc \u06a9\u0646\u062f.\n\u0627\u0641\u0634\u0627\u06cc \u0647\u0645\u0627\u0647\u0646\u06af \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 15 \u0645\u06cc 2024 \u0622\u063a\u0627\u0632 \u0634\u062f \u0648 \u062f\u0631 25 \u0645\u06cc 2025 \u067e\u0633 \u0627\u0632 \u0627\u0635\u0644\u0627\u062d \u0628\u062e\u0634 \u0642\u0627\u0628\u0644 \u062a\u0648\u062c\u0647\u06cc \u0627\u0632 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u062f\u0646\u06cc\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0628\u0647 \u067e\u0627\u06cc\u0627\u0646 \u0631\u0633\u06cc\u062f. \u0639\u0644\u06cc\u0631\u063a\u0645 \u0686\u0646\u062f\u06cc\u0646 \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u0641\u0632\u0648\u062f\u0646\u06cc \u0628\u0631\u0627\u06cc \u0631\u0641\u0639\u060c \u0627\u06cc\u0646 \u0641\u0631\u0622\u06cc\u0646\u062f \u0628\u0627 \u0627\u0631\u062a\u0628\u0627\u0637 \u0645\u0648\u062b\u0631 \u0628\u06cc\u0646 \u0645\u062d\u0642\u0642\u0627\u0646 \u0648 \u0634\u0631\u06a9\u062a \u0645\u0634\u062e\u0635 \u0634\u062f.\n\u0627\u06cc\u0646 \u062d\u0627\u062f\u062b\u0647 \u0628\u0627\u0631 \u062f\u06cc\u06af\u0631 \u0627\u0647\u0645\u06cc\u062a \u062a\u0634\u062e\u06cc\u0635 \u0632\u0648\u062f\u0647\u0646\u06af\u0627\u0645 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627 \u062f\u0631 \u0644\u0627\u06cc\u0647 \u0647\u0627\u06cc \u067e\u0646\u0647\u0627\u0646 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0634\u0628\u06a9\u0647 \u0631\u0627 \u0628\u0631\u062c\u0633\u062a\u0647 \u06a9\u0631\u062f. \u0627\u0632 \u0622\u0646\u062c\u0627\u06cc\u06cc \u06a9\u0647 \u0645\u0648\u062f\u0645 \u0647\u0627\u06cc \u0645\u0627\u0647\u0648\u0627\u0631\u0647 \u0627\u06cc \u0646\u0642\u0634 \u06a9\u0644\u06cc\u062f\u06cc \u062f\u0631 \u0627\u0631\u0627\u0626\u0647 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u062f\u0627\u0631\u0646\u062f\u060c \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0627\u0635\u0644\u0627\u062d \u0646\u0634\u062f\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0639\u0648\u0627\u0642\u0628 \u0628\u0633\u06cc\u0627\u0631 \u062c\u062f\u06cc \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u062f. \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0628\u0647 \u0645\u0648\u0642\u0639 \u0648\u00a0\u0645\u0645\u06cc\u0632\u06cc\u00a0\u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0645\u0633\u062a\u0642\u0644 \u062f\u0631 \u062d\u0627\u0644 \u062a\u0628\u062f\u06cc\u0644 \u0634\u062f\u0646 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0627\u062c\u0628\u0627\u0631\u06cc \u0628\u0631\u0627\u06cc \u062d\u0641\u0638 \u0627\u0645\u0646\u06cc\u062a \u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 \u0645\u062f\u0631\u0646 \u0627\u0633\u062a.\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-04-28T16:22:44.000000Z"}, {"uuid": "a10d093d-794e-40e1-84ac-e94fb880c55c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/465", "content": "Top Security News for Today\n\nTriada strikes back  \nhttps://securelist.com/triada-trojan-modules-analysis/116380/\n\n5 CVEs and a CISA Advisory for Planet Technology industrial switches  \nhttps://www.reddit.com/r/netsec/comments/1k7hcog/5_cves_and_a_cisa_advisory_for_planet_technology/\n\nCryptocurrency Thefts Get Physical  \nhttps://www.schneier.com/blog/archives/2025/04/cryptocurrency-thefts-get-physical.html\n\nThree new vulnerabilities found related to IXON VPN client resulting in Local Privilege Escalation (LPE)  \nhttps://www.reddit.com/r/netsec/comments/1k7ilys/three_new_vulnerabilities_found_related_to_ixon/\n\nIs airplane mode lying? A browser behavior demo that messes with expectations.  \nhttps://www.reddit.com/r/netsec/comments/1k7il8o/is_airplane_mode_lying_a_browser_behavior_demo/\n\nRemote Code Execution on Viasat Modems (CVE-2024-6198)  \nhttps://www.reddit.com/r/netsec/comments/1k7knmy/remote_code_execution_on_viasat_modems_cve20246198/\n\nExplore practical best practices to secure your data with Microsoft Purview  \nhttps://www.microsoft.com/en-us/security/blog/2025/04/25/explore-practical-best-practices-to-secure-your-data-with-microsoft-purview/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-04-26T09:30:19.000000Z"}, {"uuid": "b8a77e75-fad7-4b38-9ddf-3732b01e3679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6198", "type": "seen", "source": "https://t.me/cvedetector/23757", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-6198 - \"TP-Link Modem Lighttpd SNORE Stack Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-6198 \nPublished : April 25, 2025, 1:15 p.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the\u00a0\u201cSNORE\u201d interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker  \nwith access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the\u00a0modem. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T17:30:49.000000Z"}]}