{"vulnerability": "CVE-2022-30311", "sightings": [{"uuid": "527163df-c29b-4e2d-9af3-97a49c144888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30311", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-182-04", "content": "", "creation_timestamp": "2025-07-01T10:00:00.000000Z"}, {"uuid": "d9ccb742-e7ba-42b0-9cf7-4e0234992aa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30311", "type": "seen", "source": "https://t.me/cibsecurity/44306", "content": "\u203c CVE-2022-30311 \u203c\n\nIn Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint \"cecc-x-refresh-request\" POST request doesn\u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u201e\u00a2t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-13T18:18:12.000000Z"}, {"uuid": "e07f03b5-3942-45d2-a835-c4e159f9601d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30311", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6376", "content": "#exploit\n1. CVE-2022-30308, CVE-2022-30309, CVE-2022-30310, CVE-2022-30311:\nFESTO: CECC-X-M1 - Command Injection Vulnerabilities\nhttps://onekey.com/blog/advisory-festo-cecc-x-m1-command-injection-vulnerabilities\n\n2. CVE-2022-26377:\nApache HTTPd AJP Request Smuggling\nhttp://noahblog.360.cn/apache-httpd-ajp-request-smuggling", "creation_timestamp": "2022-07-11T12:37:51.000000Z"}]}