{"vulnerability": "CVE-2023-46455", "sightings": [{"uuid": "0015005f-c15d-4011-9f31-9ee0843eb982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46455", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6110", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploits for GL.iNet CVE-2023-46454, CVE-2023-46455 and CVE-2023-46456\nURL\uff1ahttps://github.com/cyberaz0r/GL.iNet-Multiple-Vulnerabilities\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-08T01:48:35.000000Z"}, {"uuid": "dd08bf63-06b5-41d1-b09a-82a2c5960a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46455", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/198767", "content": "https://ift.tt/QVNM7PW\n[remote] GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit", "creation_timestamp": "2024-03-03T15:11:50.000000Z"}, {"uuid": "8baff4b7-c982-4c9d-83df-f39adf5527af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46455", "type": "seen", "source": "https://t.me/ctinow/161790", "content": "https://ift.tt/CEtBcdf\nCVE-2023-46455 | GL.iNet GL-AR300M up to 4.3.7 OpenVPN Client File Upload path traversal", "creation_timestamp": "2024-01-02T14:36:33.000000Z"}, {"uuid": "3e12a499-6bd8-4178-8ec2-a5bf8865b603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46455", "type": "published-proof-of-concept", "source": "https://t.me/VulnerabilityNews/35407", "content": "[remote] GL.iNet AR300M v4.3.7 Arbitrary File Read - CVE-2023-46455 Exploit\nRead More", "creation_timestamp": "2024-03-03T15:14:52.000000Z"}]}