{"vulnerability": "cve-2024-7205", "sightings": [{"uuid": "0e755a93-b8b6-4b4b-9c6d-aeb91c1d9ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7205", "type": "seen", "source": "https://t.me/cvedetector/2107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7205 - eWeLink Cloud Service Data Exposure and Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7205 \nPublished : July 31, 2024, 6:15 a.m. | 39\u00a0minutes ago \nDescription : When the device is shared,\u00a0the homepage module are before 2.19.0 \u00a0in eWeLink Cloud Service\u00a0allows Secondary user to take over devices as primary user via sharing unnecessary device-sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-31T09:18:36.000000Z"}, {"uuid": "2e5f1c1c-0f91-40d7-bd74-33d6d61da674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7205", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/8115", "content": "\u200aCVE-2024-7205 in eWeLink Cloud Service Exposes Devices to Takeover\n\nhttps://securityonline.info/cve-2024-7205-in-ewelink-cloud-service-exposes-devices-to-takeover/", "creation_timestamp": "2024-07-31T11:45:25.000000Z"}, {"uuid": "9242e5a3-ca9a-4836-9863-9ce0e8e89a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7205", "type": "seen", "source": "https://bsky.app/profile/0xor0ne.bsky.social/post/3lwgiqf4wjs26", "content": "", "creation_timestamp": "2025-08-15T09:04:21.206218Z"}]}