{"vulnerability": "CVE-2023-3362", "sightings": [{"uuid": "a1ab280a-3d68-4cd3-919c-13a1d0750ba3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33625", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "83382d47-9928-44c0-b923-2abab63357aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33625", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:54.000000Z"}, {"uuid": "8bb77213-35bd-4a0a-8f46-edd3c83109ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33625", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:01.000000Z"}, {"uuid": "d61e1daf-c4c2-4ff7-8e81-8ef83a604ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33625", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "326a7b21-6403-4401-84d9-71332d0cf133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33625", "type": "seen", "source": "https://t.me/arpsyndicate/1469", "content": "#ExploitObserverAlert\n\nCVE-2023-33625\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-33625. D-Link DIR-600 Hardware Version B5, Firmware Version 2.18 was discovered to contain a command injection vulnerability via the ST parameter in the lxmldbc_system() function.\n\nFIRST-EPSS: 0.000850000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-05T23:50:57.000000Z"}, {"uuid": "2550303f-813f-407b-9e3f-0150b32d3320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33629", "type": "seen", "source": "https://t.me/arpsyndicate/248", "content": "#ExploitObserverAlert\n\nCVE-2023-33629\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-33629. H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.\n\nFIRST-EPSS: 0.005340000\nNVD-IS: 5.9\nNVD-ES: 1.2", "creation_timestamp": "2023-11-17T09:27:08.000000Z"}, {"uuid": "caf923b3-a19b-4b61-94ad-3e5090d05f14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33620", "type": "seen", "source": "https://t.me/cibsecurity/65167", "content": "\u203c CVE-2023-33620 \u203c\n\nGL.iNET GL-AR750S-Ext firmware v3.215 uses an insecure protocol in its communications which allows attackers to eavesdrop via a man-in-the-middle attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-13T20:20:08.000000Z"}, {"uuid": "7b03ad04-302a-4994-92cb-e78245222ce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33627", "type": "seen", "source": "https://t.me/cibsecurity/64836", "content": "\u203c CVE-2023-33627 \u203c\n\nH3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the UpdateSnat interface at /goform/aspForm.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-01T00:24:44.000000Z"}]}