{"vulnerability": "CVE-2023-41780", "sightings": [{"uuid": "8cd27393-f36a-42a7-ac3d-a6596ab41f9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41780", "type": "seen", "source": "https://t.me/cibsecurity/74260", "content": "\u203c\ufe0fCVE-2023-41780\u203c\ufe0f\n\nThere is an unsafe DLL loading vulnerability in ZTE ZXCLOUD iRAI. Due to the \u00a0program \u00a0failed to adequately validate the user's input, an attacker could exploit this vulnerability \u00a0to escalate local privileges.   \n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-04T01:30:55.000000Z"}, {"uuid": "ef4a67a5-5a07-454d-bc4b-2d7f39fa5412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41780", "type": "seen", "source": "https://t.me/ctinow/171845", "content": "https://ift.tt/qF1DUzJ\nCVE-2023-41780 | ZTE ZXCLOUD iRAI up to 7.23.23 path traversal", "creation_timestamp": "2024-01-23T10:56:18.000000Z"}, {"uuid": "b5eaed6a-9b4c-4cd7-bfe2-59762b74baf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-41780", "type": "seen", "source": "https://t.me/ctinow/162160", "content": "https://ift.tt/oXuPsiq\nCVE-2023-41780", "creation_timestamp": "2024-01-03T03:26:28.000000Z"}]}