{"vulnerability": "CVE-2019-1663", "sightings": [{"uuid": "b9713b5b-cf38-4861-b942-dc52d47bb654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47348", "content": "", "creation_timestamp": "2019-09-03T00:00:00.000000Z"}, {"uuid": "5a24b85f-d9e2-4dd3-888d-eb6c5c74d8f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46705", "content": "", "creation_timestamp": "2019-04-15T00:00:00.000000Z"}, {"uuid": "a9cb2aa2-c490-4409-a337-a7e860aa6458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "1a0f5934-69a4-43a2-968e-8fa4c1384d3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:13.000000Z"}, {"uuid": "19a96fd6-d1a3-4694-99a5-54437be3d0f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/cve_2019_1663_cisco_rmi_rce.rb", "content": "", "creation_timestamp": "2019-08-30T18:32:25.000000Z"}, {"uuid": "e8df76da-ca2d-4710-b98e-210d0218c468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "MISP/a41d8549-5384-5e1a-8c33-bf88e35b5a0a", "content": "", "creation_timestamp": "2025-10-14T10:31:52.000000Z"}, {"uuid": "8134f42b-a7e0-4400-b1c9-9a6285c43cb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "Telegram/cHcofYq5yVH7DLc69hIcAd2SE1E77x3v0sMIcSbMCujGDRo", "content": "", "creation_timestamp": "2025-09-03T03:00:07.000000Z"}, {"uuid": "ea77cdbb-c2e6-4386-a870-c89ce8f58932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "https://t.me/ctinow/8646", "content": "Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers Cisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows unauthenticated, remote attackers to execute arbitrary code. https://threatpost.com/cisco-fixes-critical-flaw-in-wireless-vpn-firewall-routers/142284/", "creation_timestamp": "2019-02-28T15:37:47.000000Z"}, {"uuid": "a1565be0-fb1f-4475-bbb2-b7a42e1a78dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/188", "content": "#exploit\n1. CVE-2019-1663:\nA pre-authentication code execution vulnerability in the RV110W/RV130W/RV215W router series\nhttps://www.pentestpartners.com/security-blog/cisco-rv130-its-2019-but-yet-strcpy\n\n2. CVE-2019-6977:\nPHP \"Sandbox\" escape\nhttps://hackerone.com/reports/478368", "creation_timestamp": "2022-12-07T16:08:09.000000Z"}, {"uuid": "428a124d-7aff-425f-b784-c1d9e21e536f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "https://t.me/cibsecurity/2779", "content": "\u274c Cisco Fixes Critical Flaw in Wireless VPN, Firewall Routers \u274c\n\nCisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows unauthenticated, remote attackers to execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"Threatpost | The first stop for security news\".", "creation_timestamp": "2019-02-28T15:31:41.000000Z"}, {"uuid": "0f5db4dd-614a-4918-b658-b3bcccaf1af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-16639", "type": "seen", "source": "https://t.me/cvedetector/985", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-16639 - Ruijie EG-2000 series Telnet Command Injection\", \n  \"Content\": \"CVE ID : CVE-2019-16639 \nPublished : July 16, 2024, 5:15 p.m. | 16\u00a0minutes ago \nDescription : An issue was found on the Ruijie EG-2000 series gateway. There is a newcli.php API interface without access control, which can allow an attacker (who only has web interface access) to use TELNET commands and/or show admin passwords via the mode_url=exec&amp;command= substring. This affects EG-2000SE EG_RGOS 11.9 B11P1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T19:38:01.000000Z"}, {"uuid": "306bca7d-0dd2-41f5-9f21-4146658a6f65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-16638", "type": "seen", "source": "https://t.me/cvedetector/984", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-16638 - Ruijie EG-2000 Password Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2019-16638 \nPublished : July 16, 2024, 5:15 p.m. | 16\u00a0minutes ago \nDescription : An issue was found on the Ruijie EG-2000 series gateway. An attacker can easily dump cleartext stored passwords in /data/config.text with simple XORs. This affects EG-2000SE EG_RGOS 11.1(1)B1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-16T19:38:00.000000Z"}, {"uuid": "0f8f9e27-5934-4f35-bcba-20895ddf3661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1663", "type": "seen", "source": "https://t.me/information_security_channel/25144", "content": "Cisco released security updates for 2 severe vulnerabilities that affected Cisco wireless VPN, Firewall and Cisco Webex Meetings Desktop App. First one is a remote command execution vulnerability that has been marked as \u201cCritical\u201d and another one is local Command Injection Vulnerability which is marked as \u201chigh\u201d severity. Remote Command Execution Vulnerability CVE-2019-1663 affected Cisco [\u2026]\nThe post Cisco Released Security Updates for 2 Vulnerabilities that allows Hackers to Compromise Cisco Wireless Routers (https://gbhackers.com/cisco-released-security-updates-3/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2019-03-01T16:19:36.000000Z"}]}