{"vulnerability": "CVE-2022-3705", "sightings": [{"uuid": "a36ef253-b47f-4128-a9e4-fa4be62ef43b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113721043770547462", "content": "", "creation_timestamp": "2024-12-26T20:36:59.836086Z"}, {"uuid": "835b0c5c-8919-44e5-ae34-7f8a7ceab974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lebqiq2tvs2l", "content": "", "creation_timestamp": "2024-12-27T10:06:23.369481Z"}, {"uuid": "bc898440-2486-4509-bc86-3db4f124a07e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3leewonbz2k2l", "content": "", "creation_timestamp": "2024-12-28T16:35:06.391313Z"}, {"uuid": "e372a549-79ad-4866-8f42-6223e21cccd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lexh54je7l2o", "content": "", "creation_timestamp": "2025-01-05T01:17:24.256866Z"}, {"uuid": "e45eb777-b3ae-4e0e-851b-e0b9583c75ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "MISP/d776572a-20aa-5bd6-8c28-05f8506eaf72", "content": "", "creation_timestamp": "2025-11-27T15:20:22.000000Z"}, {"uuid": "86331714-fa38-4060-b4f9-7f4be456048e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://threatintel.cc/2025/11/27/botnet-takes-advantage-of-aws.html", "content": "", "creation_timestamp": "2025-11-27T11:52:43.000000Z"}, {"uuid": "f6feffd2-1217-4e26-bf80-1ce2992c50bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115621753678740046", "content": "", "creation_timestamp": "2025-11-27T12:52:30.946595Z"}, {"uuid": "d5bd8261-7bc3-4227-95a3-ab46e92c5a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m7lysor63o2w", "content": "", "creation_timestamp": "2025-12-10T02:21:58.778937Z"}, {"uuid": "acee3d84-da09-4400-893f-e88f49401685", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115685492456078196", "content": "", "creation_timestamp": "2025-12-08T19:02:07.735672Z"}, {"uuid": "947686fa-dff0-4406-b1f4-d2c6c4353866", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3m7it3ipqpt2v", "content": "", "creation_timestamp": "2025-12-08T20:01:32.510211Z"}, {"uuid": "80629f51-83d1-4829-90bb-f81b1670098b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/115686942262121895", "content": "", "creation_timestamp": "2025-12-09T01:10:49.775629Z"}, {"uuid": "0c7955d0-2cdc-4bca-968c-bd82f5b5da6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3m7k2a4sccc2a", "content": "", "creation_timestamp": "2025-12-09T07:42:03.862917Z"}, {"uuid": "d885b886-9ca1-4c23-9550-1ed3c004913e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m7nfje4vfe2m", "content": "", "creation_timestamp": "2025-12-10T15:42:04.142066Z"}, {"uuid": "0da48cdb-808e-436f-afc8-6a20340d6eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m7lgxdyo7t2g", "content": "", "creation_timestamp": "2025-12-09T21:02:29.809560Z"}, {"uuid": "15f18dd2-6b33-41a8-a992-dddd301b5a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m7limvbjos27", "content": "", "creation_timestamp": "2025-12-09T21:32:24.260270Z"}, {"uuid": "ff27e5b0-cd2b-4224-9792-c9d662010a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m7lis5ifnc27", "content": "", "creation_timestamp": "2025-12-09T21:35:21.703877Z"}, {"uuid": "d1a3d97a-2a86-4221-8067-b4becd94e070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37055", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/5922963", "content": "", "creation_timestamp": "2026-03-04T01:42:23.659789Z"}, {"uuid": "04695dbc-7ae7-4559-8ed5-0a84f98dea4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-37055", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/6a14ca05-6976-4bfd-a46c-17b6f6cf93c0", "content": "", "creation_timestamp": "2026-02-02T12:25:45.212155Z"}, {"uuid": "a27636bd-bc3f-42d4-aa98-c78657893b33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "exploited", "source": "https://t.me/itsec_news/5064", "content": "\u200b\u26a1\ufe0f\u0411\u043e\u0442\u043d\u0435\u0442\u044b \u0430\u0442\u0430\u043a\u0443\u044e\u0442: CAPSAICIN \u0438 FICORA \u043d\u0430\u0446\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 D-Link\n\n\ud83d\udcac\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0440\u0435\u0437\u043a\u0438\u0439 \u0440\u043e\u0441\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 D-Link. \u041e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u0443\u0433\u0440\u043e\u0437\u0430\u043c\u0438 \u0441\u0442\u0430\u043b\u0438 \u043c\u043e\u0434\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Mirai \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c FICORA \u0438 Kaiten (\u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a Tsunami), \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u0438\u043c\u044f CAPSAICIN.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Fortinet FortiGuard Labs , \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u044d\u0442\u0438\u0445 \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 D-Link. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0447\u0435\u0440\u0435\u0437 \u0444\u0443\u043d\u043a\u0446\u0438\u044e GetDeviceSettings \u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 HNAP (Home Network Administration Protocol), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b. \u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u043f\u043e\u0447\u0442\u0438 \u0434\u0435\u0441\u044f\u0442\u044c \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434 \u0438 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432 \u0442\u0430\u043a\u0438\u0445 CVE, \u043a\u0430\u043a CVE-2015-2051 , CVE-2019-10891 , CVE-2022-37056 \u0438 CVE-2024-33112 .\n\n\u0411\u043e\u0442\u043d\u0435\u0442 FICORA, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 Fortinet, \u043e\u0445\u0432\u0430\u0442\u0438\u043b \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u043a\u0440\u0443\u0433 \u0441\u0442\u0440\u0430\u043d, \u0442\u043e\u0433\u0434\u0430 \u043a\u0430\u043a CAPSAICIN \u0441\u043a\u043e\u043d\u0446\u0435\u043d\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0441\u044f \u043d\u0430 \u0432\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0430\u0437\u0438\u0430\u0442\u0441\u043a\u0438\u0445 \u0440\u0435\u0433\u0438\u043e\u043d\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u042f\u043f\u043e\u043d\u0438\u044e \u0438 \u0422\u0430\u0439\u0432\u0430\u043d\u044c. \u0410\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c CAPSAICIN \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0430\u0441\u044c \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c 21\u201322 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430.\n\n\u041c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0440\u0430\u0431\u043e\u0442\u044b \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432\nFICORA \u0437\u0430\u0440\u0430\u0436\u0430\u0435\u0442 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0447\u0435\u0440\u0435\u0437 \u0441\u043a\u0440\u0438\u043f\u0442-\u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a \u00abmulti\u00bb, \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0439 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u0441 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 (103.149.87[.]69). \u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0440\u0430\u0431\u043e\u0442\u0443 \u043d\u0430 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u0430\u0445 Linux, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u044b wget, ftpget, curl \u0438 tftp. \u0411\u043e\u0442\u043d\u0435\u0442 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u0431\u0440\u0443\u0442\u0444\u043e\u0440\u0441\u0430, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u043f\u043e\u0434\u0431\u043e\u0440 \u043f\u0430\u0440\u043e\u043b\u0435\u0439, \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f DDoS-\u0430\u0442\u0430\u043a \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u044b UDP, TCP \u0438 DNS.\n\nCAPSAICIN, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u043a\u0440\u0438\u043f\u0442 \u00abbins.sh\u00bb \u0441 IP-\u0430\u0434\u0440\u0435\u0441\u0430 87.10.220[.]221. \u0415\u0433\u043e \u043f\u043e\u0434\u0445\u043e\u0434 \u0441\u0445\u043e\u0436: \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0431\u043e\u0442\u043d\u0435\u0442\u0430 \u0434\u043b\u044f \u0440\u0430\u0437\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440 Linux \u0434\u043b\u044f \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043e\u0445\u0432\u0430\u0442\u0430. \u042d\u0442\u043e\u0442 \u0431\u043e\u0442\u043d\u0435\u0442 \u0431\u043b\u043e\u043a\u0438\u0440\u0443\u0435\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c, \u0447\u0442\u043e\u0431\u044b \u043e\u0441\u0442\u0430\u0432\u0430\u0442\u044c\u0441\u044f \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u043c \u041f\u041e \u043d\u0430 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f CAPSAICIN \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u043a \u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f (192.110.247[.]46), \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0436\u0435\u0440\u0442\u0432\u044b \u0438 \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d\u043d\u043e\u0435 \u0435\u0439 \u0438\u043c\u044f. \u0417\u0430\u0442\u0435\u043c \u0431\u043e\u0442\u043d\u0435\u0442 \u043e\u0436\u0438\u0434\u0430\u0435\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434, \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0435 DDoS-\u0430\u0442\u0430\u043a.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b CAPSAICIN\nGETIP: \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 IP-\u0430\u0434\u0440\u0435\u0441\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430;\nCLEARHISTORY: \u043e\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u0441\u0442\u043e\u0440\u0438\u0438 \u043a\u043e\u043c\u0430\u043d\u0434;\nINSTALL: \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u0444\u0430\u0439\u043b\u0430;\nDNS: \u0443\u0441\u0438\u043b\u0435\u043d\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u0447\u0435\u0440\u0435\u0437 DNS;\nHTTP: HTTP-\u0444\u043b\u0443\u0434;\nKILL: \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u0435 \u0441\u0435\u0441\u0441\u0438\u0438.\nCAPSAICIN \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0442\u0438\u043f\u0430 BlackNurse \u0438 \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c TCP-\u0444\u043b\u0443\u0434\u0438\u043d\u0433.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0431\u043e\u0442\u043d\u0435\u0442\u0430\u043c\u0438, \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u043f\u043e\u0447\u0442\u0438 \u0434\u0435\u0441\u044f\u0442\u044c \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434, \u0430\u0442\u0430\u043a\u0438 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u0443\u0433\u0440\u043e\u0436\u0430\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443. \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u044b\u0439 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-12-27T17:27:32.000000Z"}, {"uuid": "03e1b939-21b7-4650-992a-ab70ef6d6444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/348", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37056\n\ud83d\udd39 Description: D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,\n\ud83d\udccf Published: 2022-08-28T16:03:48\n\ud83d\udccf Modified: 2025-01-07T04:56:27.766Z\n\ud83d\udd17 References:\n1. https://www.dlink.com/en/security-bulletin/\n2. https://drive.google.com/file/d/127tqMUvAxQ4OlycoSNtcP0x2282Y75GJ/view?usp=sharing\n3. https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308", "creation_timestamp": "2025-01-07T05:39:29.000000Z"}, {"uuid": "2f30ec84-f03b-4dda-87d1-4021f1816898", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37056", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/176", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-9h5m-xxfw-pfmj\n\ud83d\udd17 Aliases: CVE-2022-37056\n\ud83d\udd39 Details: D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main,\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:30:58Z\n\ud83d\uddd3\ufe0f Published: 2022-08-29T00:00:33Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-77, CWE-78\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2022-3056\n2. https://drive.google.com/file/d/12tqMUvAxQ4OlycoSNtcP0x2282Y5GJ/view?usp=sharing\n3. https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308\n4. https://www.dlink.com/en/security-bulletin", "creation_timestamp": "2025-01-06T15:38:43.000000Z"}, {"uuid": "51c2bbb2-31c5-40f2-a22d-ee0e4f2a248e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37057", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/177", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-8jw9-7jrj-wp3f\n\ud83d\udd17 Aliases: CVE-2022-37057\n\ud83d\udd39 Details: D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Command Injection via cgibin, ssdpcgi_main.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:30:58Z\n\ud83d\uddd3\ufe0f Published: 2022-08-29T00:00:33Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-77, CWE-78\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2022-305\n2. https://drive.google.com/file/d/1_UUpraFTxxB9ujrgVLQZXQ8Q8M58BAF/view?usp=sharing\n3. https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10308\n4. https://www.dlink.com/en/security-bulletin", "creation_timestamp": "2025-01-06T15:38:50.000000Z"}, {"uuid": "4e6f0e1a-44c7-4241-97fe-d7c52ba23941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37052", "type": "seen", "source": "https://t.me/cibsecurity/68967", "content": "\u203c CVE-2022-37052 \u203c\n\nA reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-22T22:18:11.000000Z"}, {"uuid": "f2ab37fa-8a92-4ce9-b063-816717a782b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3705", "type": "seen", "source": "https://t.me/cibsecurity/52117", "content": "\u203c CVE-2022-3705 \u203c\n\nA vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-27T01:14:34.000000Z"}, {"uuid": "6e82afcd-6499-45ca-8c29-a78010f2c307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37059", "type": "seen", "source": "https://t.me/cibsecurity/48961", "content": "\u203c CVE-2022-37059 \u203c\n\nCross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-29T16:33:59.000000Z"}]}