{"uuid": "bcf0a262-cf43-473a-a8d3-cce1122548f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12124", "type": "seen", "source": "https://t.me/arpsyndicate/2042", "content": "#ExploitObserverAlert\n\nCVE-2020-12124\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-12124. A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.\n\nFIRST-EPSS: 0.002690000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-20T15:42:28.000000Z"}