{"vulnerability": "CVE-2022-4813", "sightings": [{"uuid": "2e407ef2-c804-4a14-9b06-16238b9dc0f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48130", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8945", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48130\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda W20E v15.11.0.6 was discovered to contain multiple stack overflows in the function formSetStaticRoute via the parameters staticRouteNet, staticRouteMask, staticRouteGateway, staticRouteWAN.\n\ud83d\udccf Published: 2023-02-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T19:01:14.647Z\n\ud83d\udd17 References:\n1. https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md", "creation_timestamp": "2025-03-26T19:26:22.000000Z"}, {"uuid": "c47f719b-6951-403f-bfe2-24845c513f04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48130", "type": "seen", "source": "https://t.me/cibsecurity/57423", "content": "\u203c CVE-2022-48130 \u203c\n\nTenda W20E v15.11.0.6 was discovered to contain multiple stack overflows in the function formSetStaticRoute via the parameters staticRouteNet, staticRouteMask, staticRouteGateway, staticRouteWAN.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-03T00:15:15.000000Z"}, {"uuid": "aed05078-b28c-4a2f-9a13-35d461f6a364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4813", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4813\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L)\n\ud83d\udd39 Description: Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.\n\ud83d\udccf Published: 2022-12-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-10T16:41:06.432Z\n\ud83d\udd17 References:\n1. https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53\n2. https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc", "creation_timestamp": "2025-04-10T16:49:19.000000Z"}, {"uuid": "cc134a62-8cd9-4b3f-82aa-cadc5bcc3390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4813", "type": "seen", "source": "https://t.me/cibsecurity/55482", "content": "\u203c CVE-2022-4813 \u203c\n\nInsufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-28T16:12:23.000000Z"}]}