{"vulnerability": "CVE-2018-20334", "sightings": [{"uuid": "c270b133-2b56-4365-96c6-b70501954cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-20334", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "90f84b77-6f40-4919-bbce-d36b06a424cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-20334", "type": "seen", "source": "https://t.me/cibsecurity/10642", "content": "ATENTION\u203c New - CVE-2018-20334\n\nAn issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-20T06:32:20.000000Z"}]}