{"vulnerability": "CVE-2023-23120", "sightings": [{"uuid": "cef1aace-f357-454a-99f5-841f02402848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23120", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8949", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-23120\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.\n\ud83d\udccf Published: 2023-02-02T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T18:57:03.492Z\n\ud83d\udd17 References:\n1. https://www.trendnet.com/support/\n2. https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/HJl1oFzci", "creation_timestamp": "2025-03-26T19:26:28.000000Z"}, {"uuid": "25fd7388-16a0-41e0-8937-a99f5350ad73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23120", "type": "seen", "source": "https://t.me/cibsecurity/57409", "content": "\u203c CVE-2023-23120 \u203c\n\nThe use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes TRENDnet TV-IP651WI Network Camera firmware version v1.07.01 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-06T00:44:50.000000Z"}]}