{"uuid": "4079c902-a04e-4eae-a2f2-9b106b742b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47121", "type": "seen", "source": "https://t.me/cvedetector/6455", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47121 - GoTenna Pro Weak Password Decryptability\", \n  \"Content\": \"CVE ID : CVE-2024-47121 \nPublished : Sept. 26, 2024, 6:15 p.m. | 43\u00a0minutes ago \nDescription : The goTenna Pro series uses a weak password for the QR broadcast message. If the QR broadcast message is captured over RF it is possible to decrypt it and use it to decrypt all future and past messages sent via encrypted broadcast. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T21:21:25.000000Z"}