{"vulnerability": "cve-2024-9570", "sightings": [{"uuid": "887c75f8-2f6a-495d-be68-c4a37cb3b94e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/551", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}, {"uuid": "b5c6213f-4050-4a99-af4e-c4c30bbf5352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8726", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit for CVE-2024-9570\nURL\uff1ahttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-11T16:06:30.000000Z"}, {"uuid": "f199facb-6702-4c03-8ec0-1c70e9a06880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "seen", "source": "https://t.me/cvedetector/7251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9570 - D-Link DIR-619L Buffer Overflow Remote Vulnerability in formEasySetTimezone\", \n  \"Content\": \"CVE ID : CVE-2024-9570 \nPublished : Oct. 7, 2024, 4:15 p.m. | 39\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-07T19:18:43.000000Z"}, {"uuid": "743a5018-ea02-4df1-9c2b-018ec732036a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2269", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-11T18:10:07.000000Z"}, {"uuid": "911fa210-5d5d-4ce2-94df-4afb959ff0c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "Telegram/FdOsM6pHj80Byb29h9Pdq_8_oSqAtRMNzb7HDAsARtESIA", "content": "", "creation_timestamp": "2024-10-15T05:09:08.000000Z"}, {"uuid": "6b7b69e4-fe03-49fc-ab4b-845a31c0d811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/19581", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-11T18:10:07.000000Z"}, {"uuid": "9a7640d9-6f8e-409b-877b-2a88ade9da5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1086", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T04:34:04.000000Z"}, {"uuid": "6ba9fb75-68a7-4a79-8a6f-d0c6879724e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7528", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:06.000000Z"}, {"uuid": "4ab3d6d8-9ac8-41f8-a17c-66a501e19520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8900", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:06.000000Z"}, {"uuid": "66781ac2-1aa7-4410-b11e-a8af638f56e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/24165", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.  \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T05:38:11.000000Z"}, {"uuid": "c18f34b3-5686-4474-ad99-653f66954ac9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3807", "content": "Tools - Hackers Factory \n\nCVE-2024-9570: A vulnerability was found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this issue is the function formEasySetTimezone of the file /goform/formEasySetTimezone. \n\nPoC\nhttps://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nWindows Hacking tips \ud83d\udccd\n\nCredit (Source): https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nFacebook shipped buggy stack overflow detection in the Hermes JavaScript engine used by React Native:\n\nhttps://github.com/facebook/hermes/issues/1535\n\nIt breaks when the default stack guard is 64k instead of 4k. The standard 64-bit ARM Linux ABI requires 64k. So far only 1 person noticed a broken app.\n\nCheckout these two projects on github project that aims to help secure AD CS.\u00a0 \n\nhttps://github.com/Sleepw4lker/TameMyCerts\n\nAuto enum now includes a Binary Ninja plugin!\n\nhttps://github.com/junron/auto-enum/\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nHyperDbg v0.10.2 is released!\n\nhttps://github.com/HyperDbg/HyperDbg/releases/tag/v0.10.2\n\nFrida's setHardwareWatchpoint tutorial\n\nhttps://github.com/hackcatml/frida-watchpoint-tutorial\n\nhttps://t.me/CyberDilara\n#CyberDilara", "creation_timestamp": "2024-10-24T04:34:04.000000Z"}, {"uuid": "6ffd2c59-b5d1-47fb-851c-269a2fa11ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3309", "content": "https://github.com/dylvie/CVE-2024-9570_D-Link-DIR-619L-bof\n\nExploit for CVE-2024-9570\n#github #exploit", "creation_timestamp": "2024-10-12T09:49:24.000000Z"}, {"uuid": "2c4399d0-641a-4361-840f-57afdaee6bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9570", "type": "published-proof-of-concept", "source": "Telegram/Xm3lUY4PBcALvW_rbeUR9-YkKgj4C7jouamnnWDUhYzqHoxb", "content": "", "creation_timestamp": "2024-10-13T05:09:50.000000Z"}]}