{"vulnerability": "CVE-2020-10882", "sightings": [{"uuid": "24b64ed9-1e65-42c2-89cb-3e00b09e5a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10882", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48331", "content": "", "creation_timestamp": "2020-04-16T00:00:00.000000Z"}, {"uuid": "8da17ae7-3157-4780-91f6-3afba636af70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10882", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "13d25cb4-4f16-4306-b69f-40f2cc08f91c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10882", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:21.000000Z"}, {"uuid": "f9254377-9343-4679-8258-2aebe74f0e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10882", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/tplink_archer_a7_c7_lan_rce.rb", "content": "", "creation_timestamp": "2020-04-15T16:34:56.000000Z"}, {"uuid": "3af3860f-0c96-45c6-bb92-655f3874bc6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10882", "type": "seen", "source": "https://t.me/cibsecurity/16020", "content": "\u203c CVE-2020-28347 \u203c\n\ntdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-08T22:54:08.000000Z"}, {"uuid": "d92d19ff-a708-4a49-bea0-2d0531761490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10882", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/919", "content": "#exploit\nCVE-2020-10882:\nVulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the TP- Link Archer A7 (AC1750) router, hardware ver.5, MIPS, firmware ver.190726\nhttps://www.zerodayinitiative.com/blog/2020/4/6/exploiting-the-tp-link-archer-c7-at-pwn2own-tokyo", "creation_timestamp": "2022-11-27T19:31:24.000000Z"}]}