<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T13:19:35.472855+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aa105ab7-b2a2-4999-b646-1bd02fcb761d/export</id>
    <title>aa105ab7-b2a2-4999-b646-1bd02fcb761d</title>
    <updated>2026-05-08T13:19:35.851323+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aa105ab7-b2a2-4999-b646-1bd02fcb761d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7747", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515486312761169", "content": "\ud83d\udd34 CRITICAL: CVE-2026-7747 in Totolink N300RH (v3.2.4-B20220812) \u2014 remote, unauthenticated buffer overflow via /cgi-bin/cstecgi.cgi Password param. Exploit is public; no patch yet. Restrict mgmt access! https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #CVE20267747 #IoTSecurity", "creation_timestamp": "2026-05-04T09:00:32.031587Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aa105ab7-b2a2-4999-b646-1bd02fcb761d/export"/>
    <published>2026-05-04T09:00:32.031587+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/91632cb8-3f2c-4d1a-8870-b1a4e1e42245/export</id>
    <title>91632cb8-3f2c-4d1a-8870-b1a4e1e42245</title>
    <updated>2026-05-08T13:19:35.851176+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "91632cb8-3f2c-4d1a-8870-b1a4e1e42245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7747", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkzcotcpov2m", "content": "Totolink N300RH (3.2.4-B20220812) faces a CRITICAL buffer overflow \u2014 remote, unauthenticated exploit now public. No patch: restrict device mgmt access &amp;amp; monitor for updates. https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #IoTSecurity", "creation_timestamp": "2026-05-04T09:00:32.046755Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/91632cb8-3f2c-4d1a-8870-b1a4e1e42245/export"/>
    <published>2026-05-04T09:00:32.046755+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f6c2691e-5db7-4743-841f-b9e03d1fd496/export</id>
    <title>f6c2691e-5db7-4743-841f-b9e03d1fd496</title>
    <updated>2026-05-08T13:19:35.851043+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f6c2691e-5db7-4743-841f-b9e03d1fd496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkze3bo7g72g", "content": "\ud83d\udd34 CVE-2026-7747 - Critical (9.8)\n\nA security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerab...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7747/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T09:25:23.108472Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f6c2691e-5db7-4743-841f-b9e03d1fd496/export"/>
    <published>2026-05-04T09:25:23.108472+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/be6dd69e-c824-41cf-9582-69d34a58e605/export</id>
    <title>be6dd69e-c824-41cf-9582-69d34a58e605</title>
    <updated>2026-05-08T13:19:35.850812+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "be6dd69e-c824-41cf-9582-69d34a58e605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkziy2wamq2p", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "creation_timestamp": "2026-05-04T10:53:07.446600Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/be6dd69e-c824-41cf-9582-69d34a58e605/export"/>
    <published>2026-05-04T10:53:07.446600+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d83fc969-1f88-4a51-9bce-905785e1bbda/export</id>
    <title>d83fc969-1f88-4a51-9bce-905785e1bbda</title>
    <updated>2026-05-08T13:19:35.847655+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d83fc969-1f88-4a51-9bce-905785e1bbda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzkbh2bwx2k", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "creation_timestamp": "2026-05-04T11:16:11.607999Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d83fc969-1f88-4a51-9bce-905785e1bbda/export"/>
    <published>2026-05-04T11:16:11.607999+00:00</published>
  </entry>
</feed>
