{"vulnerability": "CVE-2022-3575", "sightings": [{"uuid": "afaaa88c-db55-412e-9046-7b0a99e7aa34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3575", "type": "seen", "source": "https://t.me/cibsecurity/52484", "content": "\u203c CVE-2022-3575 \u203c\n\nFrauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-02T19:19:49.000000Z"}, {"uuid": "e194fba9-7b45-4d71-8eda-d2810841413e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3575", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14872", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3575\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.\n\ud83d\udccf Published: 2022-11-02T16:15:33.921Z\n\ud83d\udccf Modified: 2025-05-05T13:43:51.404Z\n\ud83d\udd17 References:\n1. https://www.frauscher.com/en/psirt", "creation_timestamp": "2025-05-05T14:20:46.000000Z"}, {"uuid": "1b8f2cd5-12d3-46b4-b3a3-ea2428b58775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35753", "type": "seen", "source": "https://t.me/cibsecurity/47821", "content": "\u203c CVE-2022-34714 \u203c\n\nWindows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:31:05.000000Z"}, {"uuid": "251b2010-340d-4f68-8366-0d93b595b6ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-35752", "type": "seen", "source": "https://t.me/cibsecurity/47821", "content": "\u203c CVE-2022-34714 \u203c\n\nWindows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-10T00:31:05.000000Z"}]}