{"vulnerability": "CVE-2019-1258", "sightings": [{"uuid": "7ad7deaa-a1ef-43c1-9a9f-145a57f62fa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12587", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/947", "content": "Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588) \nhttps://github.com/Matheus-Garbelini/esp32_esp8266_attacks", "creation_timestamp": "2019-09-07T19:19:32.000000Z"}, {"uuid": "0344b86b-78e1-439f-b4da-f0092ffd553e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12583", "type": "seen", "source": "https://t.me/arpsyndicate/2779", "content": "#ExploitObserverAlert\n\nCVE-2019-12583\n\nDESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2019-12583. Missing Access Control in the \"Free Time\" component of several Zyxel UAG, USG, and ZyWall devices allows a remote attacker to generate guest accounts by directly accessing the account generator. This can lead to unauthorised network access or Denial of Service.\n\nFIRST-EPSS: 0.004810000\nNVD-IS: 5.2\nNVD-ES: 3.9", "creation_timestamp": "2024-01-15T11:31:09.000000Z"}, {"uuid": "244b9a8d-ba28-4f2f-a029-e3d7e7dfa9e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12587", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/429", "content": "#WLAN_Security\nProof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)\nhttps://github.com/Matheus-Garbelini/esp32_esp8266_attacks", "creation_timestamp": "2021-12-07T03:44:42.000000Z"}, {"uuid": "12cde9ea-f540-4014-a27d-1959921c866c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12588", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/429", "content": "#WLAN_Security\nProof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)\nhttps://github.com/Matheus-Garbelini/esp32_esp8266_attacks", "creation_timestamp": "2021-12-07T03:44:42.000000Z"}, {"uuid": "92c4ac74-a97e-4a7f-bc34-824ea69f6201", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12586", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/429", "content": "#WLAN_Security\nProof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)\nhttps://github.com/Matheus-Garbelini/esp32_esp8266_attacks", "creation_timestamp": "2021-12-07T03:44:42.000000Z"}, {"uuid": "d6668010-14b6-4d4b-8f37-5c8cb4243ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12586", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/947", "content": "Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588) \nhttps://github.com/Matheus-Garbelini/esp32_esp8266_attacks", "creation_timestamp": "2019-09-07T19:19:32.000000Z"}, {"uuid": "82cdff4a-f48d-4b35-b0a7-9b41ce307504", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12588", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/947", "content": "Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588) \nhttps://github.com/Matheus-Garbelini/esp32_esp8266_attacks", "creation_timestamp": "2019-09-07T19:19:32.000000Z"}, {"uuid": "6428e074-55a0-4956-a8fa-1db82897f3c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12587", "type": "published-proof-of-concept", "source": "Telegram/_0GL2HLFlH7purPAly9fE_9htFJHCPdZf69GXFtJF8IKHA", "content": "", "creation_timestamp": "2019-09-08T19:25:29.000000Z"}, {"uuid": "10873dc3-e1a1-4a3a-8155-f170f069b90c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12588", "type": "published-proof-of-concept", "source": "Telegram/_0GL2HLFlH7purPAly9fE_9htFJHCPdZf69GXFtJF8IKHA", "content": "", "creation_timestamp": "2019-09-08T19:25:29.000000Z"}, {"uuid": "6f41ca49-7c90-43bc-90be-fa82e522105f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12586", "type": "published-proof-of-concept", "source": "Telegram/_0GL2HLFlH7purPAly9fE_9htFJHCPdZf69GXFtJF8IKHA", "content": "", "creation_timestamp": "2019-09-08T19:25:29.000000Z"}]}