{"vulnerability": "CVE-2020-8597", "sightings": [{"uuid": "1a8de33c-b0f2-4dd5-8fa8-a0f2c1f9b392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8597", "type": "published-proof-of-concept", "source": "Telegram/yS_-1Ku4vwDylMmbvYhhr413q-GTLB94cWzytzORvOuOFtoh", "content": "", "creation_timestamp": "2021-01-16T21:18:00.000000Z"}, {"uuid": "7fe55ce3-67c5-4990-8454-d6f29d321591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8597", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/744", "content": "#exploit\n1. CVE-2020-9054: \nZyXEL NAS pre-authentication command injection in weblogin.cgi\nhttps://www.kb.cert.org/vuls/id/498544\n]-&gt; Firmware updates:\nhttps://www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-products.shtml\n\n2. CVE-2020-8597:\nBoF in Pppd ver. 2.4.2 - 2.4.8 are vulnerable to buffer overflow due to a flaw in Extensible Authentication Protocol packet processing in eap_request and eap_response subroutines\nhttps://www.kb.cert.org/vuls/id/782301\nhttps://github.com/marcinguy/CVE-2020-8597\n]-&gt; Patch: https://github.com/paulusmack/ppp", "creation_timestamp": "2024-10-17T02:21:33.000000Z"}]}