<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 07:04:37 +0000</lastBuildDate>
    <item>
      <title>9db3bc11-a33f-4e65-8c28-6b64b16793e5</title>
      <link>https://vulnerability.circl.lu/sighting/9db3bc11-a33f-4e65-8c28-6b64b16793e5/export</link>
      <description>{"uuid": "9db3bc11-a33f-4e65-8c28-6b64b16793e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37748", "type": "seen", "source": "https://t.me/cibsecurity/31366", "content": "\u203c CVE-2021-37748 \u203c\n\nMultiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-28T16:23:14.000000Z"}</description>
      <content:encoded>{"uuid": "9db3bc11-a33f-4e65-8c28-6b64b16793e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37748", "type": "seen", "source": "https://t.me/cibsecurity/31366", "content": "\u203c CVE-2021-37748 \u203c\n\nMultiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-28T16:23:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9db3bc11-a33f-4e65-8c28-6b64b16793e5/export</guid>
      <pubDate>Thu, 28 Oct 2021 16:23:14 +0000</pubDate>
    </item>
    <item>
      <title>962cba51-ce79-4ea5-8b2b-7ac6cc1b6eba</title>
      <link>https://vulnerability.circl.lu/sighting/962cba51-ce79-4ea5-8b2b-7ac6cc1b6eba/export</link>
      <description>{"uuid": "962cba51-ce79-4ea5-8b2b-7ac6cc1b6eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37748", "type": "published-proof-of-concept", "source": "Telegram/sOfZ8THCb3p8hX66T35TvVl2N3UfkRp46p4RZ9gZSAbn6g", "content": "", "creation_timestamp": "2021-10-29T18:51:58.000000Z"}</description>
      <content:encoded>{"uuid": "962cba51-ce79-4ea5-8b2b-7ac6cc1b6eba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37748", "type": "published-proof-of-concept", "source": "Telegram/sOfZ8THCb3p8hX66T35TvVl2N3UfkRp46p4RZ9gZSAbn6g", "content": "", "creation_timestamp": "2021-10-29T18:51:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/962cba51-ce79-4ea5-8b2b-7ac6cc1b6eba/export</guid>
      <pubDate>Fri, 29 Oct 2021 18:51:58 +0000</pubDate>
    </item>
    <item>
      <title>ceb997cf-628b-46f1-9f67-bb00bfe1f28e</title>
      <link>https://vulnerability.circl.lu/sighting/ceb997cf-628b-46f1-9f67-bb00bfe1f28e/export</link>
      <description>{"uuid": "ceb997cf-628b-46f1-9f67-bb00bfe1f28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37748", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4614", "content": "#exploit\n1. Exploiting Grandstream HT801 ATA\n(CVE-2021-37748, CVE-2021-37915)\nhttps://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915\n]-&amp;gt; PoC: https://github.com/SECFORCE/CVE-2021-37748\n\n2. Finding An Unauthenticated RCE in MovableType (CVE-2021-20837)\nhttps://nemesis.sh/posts/movable-type-0day\n]-&amp;gt; PoC: https://github.com/ghost-nemesis/cve-2021-20837-poc", "creation_timestamp": "2024-08-05T18:55:24.000000Z"}</description>
      <content:encoded>{"uuid": "ceb997cf-628b-46f1-9f67-bb00bfe1f28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-37748", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4614", "content": "#exploit\n1. Exploiting Grandstream HT801 ATA\n(CVE-2021-37748, CVE-2021-37915)\nhttps://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915\n]-&amp;gt; PoC: https://github.com/SECFORCE/CVE-2021-37748\n\n2. Finding An Unauthenticated RCE in MovableType (CVE-2021-20837)\nhttps://nemesis.sh/posts/movable-type-0day\n]-&amp;gt; PoC: https://github.com/ghost-nemesis/cve-2021-20837-poc", "creation_timestamp": "2024-08-05T18:55:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ceb997cf-628b-46f1-9f67-bb00bfe1f28e/export</guid>
      <pubDate>Mon, 05 Aug 2024 18:55:24 +0000</pubDate>
    </item>
  </channel>
</rss>
