<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 11:51:25 +0000</lastBuildDate>
    <item>
      <title>aa105ab7-b2a2-4999-b646-1bd02fcb761d</title>
      <link>https://vulnerability.circl.lu/sighting/aa105ab7-b2a2-4999-b646-1bd02fcb761d/export</link>
      <description>{"uuid": "aa105ab7-b2a2-4999-b646-1bd02fcb761d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7747", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515486312761169", "content": "\ud83d\udd34 CRITICAL: CVE-2026-7747 in Totolink N300RH (v3.2.4-B20220812) \u2014 remote, unauthenticated buffer overflow via /cgi-bin/cstecgi.cgi Password param. Exploit is public; no patch yet. Restrict mgmt access! https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #CVE20267747 #IoTSecurity", "creation_timestamp": "2026-05-04T09:00:32.031587Z"}</description>
      <content:encoded>{"uuid": "aa105ab7-b2a2-4999-b646-1bd02fcb761d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7747", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515486312761169", "content": "\ud83d\udd34 CRITICAL: CVE-2026-7747 in Totolink N300RH (v3.2.4-B20220812) \u2014 remote, unauthenticated buffer overflow via /cgi-bin/cstecgi.cgi Password param. Exploit is public; no patch yet. Restrict mgmt access! https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #CVE20267747 #IoTSecurity", "creation_timestamp": "2026-05-04T09:00:32.031587Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aa105ab7-b2a2-4999-b646-1bd02fcb761d/export</guid>
      <pubDate>Mon, 04 May 2026 09:00:32 +0000</pubDate>
    </item>
    <item>
      <title>91632cb8-3f2c-4d1a-8870-b1a4e1e42245</title>
      <link>https://vulnerability.circl.lu/sighting/91632cb8-3f2c-4d1a-8870-b1a4e1e42245/export</link>
      <description>{"uuid": "91632cb8-3f2c-4d1a-8870-b1a4e1e42245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7747", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkzcotcpov2m", "content": "Totolink N300RH (3.2.4-B20220812) faces a CRITICAL buffer overflow \u2014 remote, unauthenticated exploit now public. No patch: restrict device mgmt access &amp;amp; monitor for updates. https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #IoTSecurity", "creation_timestamp": "2026-05-04T09:00:32.046755Z"}</description>
      <content:encoded>{"uuid": "91632cb8-3f2c-4d1a-8870-b1a4e1e42245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7747", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkzcotcpov2m", "content": "Totolink N300RH (3.2.4-B20220812) faces a CRITICAL buffer overflow \u2014 remote, unauthenticated exploit now public. No patch: restrict device mgmt access &amp;amp; monitor for updates. https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #IoTSecurity", "creation_timestamp": "2026-05-04T09:00:32.046755Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/91632cb8-3f2c-4d1a-8870-b1a4e1e42245/export</guid>
      <pubDate>Mon, 04 May 2026 09:00:32 +0000</pubDate>
    </item>
    <item>
      <title>f6c2691e-5db7-4743-841f-b9e03d1fd496</title>
      <link>https://vulnerability.circl.lu/sighting/f6c2691e-5db7-4743-841f-b9e03d1fd496/export</link>
      <description>{"uuid": "f6c2691e-5db7-4743-841f-b9e03d1fd496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkze3bo7g72g", "content": "\ud83d\udd34 CVE-2026-7747 - Critical (9.8)\n\nA security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerab...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7747/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T09:25:23.108472Z"}</description>
      <content:encoded>{"uuid": "f6c2691e-5db7-4743-841f-b9e03d1fd496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkze3bo7g72g", "content": "\ud83d\udd34 CVE-2026-7747 - Critical (9.8)\n\nA security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerab...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7747/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-05-04T09:25:23.108472Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f6c2691e-5db7-4743-841f-b9e03d1fd496/export</guid>
      <pubDate>Mon, 04 May 2026 09:25:23 +0000</pubDate>
    </item>
    <item>
      <title>be6dd69e-c824-41cf-9582-69d34a58e605</title>
      <link>https://vulnerability.circl.lu/sighting/be6dd69e-c824-41cf-9582-69d34a58e605/export</link>
      <description>{"uuid": "be6dd69e-c824-41cf-9582-69d34a58e605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkziy2wamq2p", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "creation_timestamp": "2026-05-04T10:53:07.446600Z"}</description>
      <content:encoded>{"uuid": "be6dd69e-c824-41cf-9582-69d34a58e605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkziy2wamq2p", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "creation_timestamp": "2026-05-04T10:53:07.446600Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/be6dd69e-c824-41cf-9582-69d34a58e605/export</guid>
      <pubDate>Mon, 04 May 2026 10:53:07 +0000</pubDate>
    </item>
    <item>
      <title>d83fc969-1f88-4a51-9bce-905785e1bbda</title>
      <link>https://vulnerability.circl.lu/sighting/d83fc969-1f88-4a51-9bce-905785e1bbda/export</link>
      <description>{"uuid": "d83fc969-1f88-4a51-9bce-905785e1bbda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzkbh2bwx2k", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "creation_timestamp": "2026-05-04T11:16:11.607999Z"}</description>
      <content:encoded>{"uuid": "d83fc969-1f88-4a51-9bce-905785e1bbda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7747", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzkbh2bwx2k", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "creation_timestamp": "2026-05-04T11:16:11.607999Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d83fc969-1f88-4a51-9bce-905785e1bbda/export</guid>
      <pubDate>Mon, 04 May 2026 11:16:11 +0000</pubDate>
    </item>
  </channel>
</rss>
