{"vulnerability": "CVE-2021-4291", "sightings": [{"uuid": "d6382363-8195-448c-8c2d-1c576fbfb092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42911", "type": "seen", "source": "https://t.me/cibsecurity/39780", "content": "\u203c CVE-2021-42911 \u203c\n\nA Format String vulnerability exists in DrayTek Vigor 2960 &lt;= 1.5.1.3, DrayTek Vigor 3900 &lt;= 1.5.1.3, and DrayTek Vigor 300B &lt;= 1.5.1.3 in the mainfunction.cgi file via a crafted HTTP message containing malformed QUERY STRING, which could let a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T00:11:36.000000Z"}, {"uuid": "68fff20d-3a13-4fa7-85f5-cb0254d384ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42912", "type": "seen", "source": "https://t.me/cibsecurity/34151", "content": "\u203c CVE-2021-42912 \u203c\n\nFiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command injection vulnerability. This vulnerability allows the attacker, once logged in, to send commands to the operating system as the root user via the ping diagnostic tool, bypassing the IP address field, and concatenating OS commands with a semicolon.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-16T20:36:13.000000Z"}, {"uuid": "43ad68a2-3760-4ba8-8c3f-71504028caa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42917", "type": "seen", "source": "https://t.me/cibsecurity/31566", "content": "\u203c CVE-2021-42917 \u203c\n\nBuffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-01T21:21:27.000000Z"}]}