{"vulnerability": "cve-2024-8893", "sightings": [{"uuid": "a688dc75-e625-4266-a170-97433ef785b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8893", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdll47u2a", "content": "", "creation_timestamp": "2025-02-14T17:15:44.608522Z"}, {"uuid": "c59c1b43-1c63-46a2-b8bf-ebfee8e85414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8893", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5ud7cfz62v", "content": "", "creation_timestamp": "2025-02-14T18:45:03.549759Z"}, {"uuid": "9918eb8a-1411-418d-8482-4609eb13e211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8893", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "1748bf87-4161-4f57-8766-80df3e2557c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8893", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4492", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8893\n\ud83d\udd25 CVSS Score: 7.3 (CVSS_V3)\n\ud83d\udd39 Description: Use of Hard-coded Credentials vulnerability in GoodWe Technologies Co., Ltd. GW1500\u2011XS allows anyone in physical proximity to the device to fully access the web interface of the inverter via Wi\u2011Fi.This issue affects GW1500\u2011XS: 1.1.2.1.\n\ud83d\udccf Published: 2025-02-14T18:30:52Z\n\ud83d\udccf Modified: 2025-02-14T18:30:52Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-8893\n2. https://os-s.net/publications/advisories/CVE-2024-8893.pdf", "creation_timestamp": "2025-02-14T19:18:36.000000Z"}, {"uuid": "0c3d3e90-4e49-4e87-8851-8bea6494e0fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-8893", "type": "seen", "source": "https://t.me/cvedetector/18131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8893 - GoodWe Technologies Co., Ltd. GW1500-XS Hard-coded Credentials Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-8893 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : Use of Hard-coded Credentials vulnerability in GoodWe Technologies Co., Ltd. GW1500\u2011XS allows anyone in physical proximity to the device to fully access the web interface of the inverter via Wi\u2011Fi.This issue affects GW1500\u2011XS: 1.1.2.1. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:08.000000Z"}]}