{"uuid": "2b2ad81e-0b19-4cae-ac87-a0582828042e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3721", "type": "exploited", "source": "https://t.me/cybersecplayground/227", "content": "\ud83d\udea8 ALERT: CVE-2024-3721 \n Under Active Exploitation\n\nA new variant of the Mirai malware botnet is exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 digital video recording devices to hijack them.\n\nThe flaw, tracked under CVE-2024-3721, is a command injection vulnerability disclosed by security researcher \"netsecfish\" in April 2024. \ud83e\udde0\ud83d\udcdf\n\n\ud83c\udfaf Vulnerability: CVE-2024-3721\n\ud83d\udca5 Impact: Remote Code Execution \u2192 Botnet Infection\n\ud83d\udd0e Targeted Devices: TBK DVR systems\n\ud83d\udcca Over 97,000+ exposed services are indexed on Hunter\n\n\ud83e\uddea Recon Queries:\n\n\ud83d\udd0d Hunter:\nprotocol.banner=\"Location:/login.rsp\"\n\n\ud83d\udd0d FOFA:\nbanner=\"Location:/login.rsp\"\n\n\ud83d\udcda In-Depth Analysis:\n    Kaspersky SecureList\n    BleepingComputer Report\n    SecurityOnline News\n\n\ud83e\uddf5 Hunter Direct Search:\n\ud83d\udd17 Search Results (97K+)\n\n\ud83d\udcbb Stay ahead in vuln intelligence &amp; recon: Join @cybersecplayground\n\ud83d\udd01 Like &amp; Share to spread awareness!\n\n#CVE2024_3721 #Mirai #botnet #hunterhow #fofa #vulnerability #infosec #osint #cybersecplayground", "creation_timestamp": "2025-06-10T20:19:36.000000Z"}