{"vulnerability": "CVE-2023-48121", "sightings": [{"uuid": "d7134c37-513e-4a2f-a2d1-0291ea01877a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/mz79O5Gczbro2H5WMb_3Vzckk-IuccpYC_5S1BWnVwGy", "content": "", "creation_timestamp": "2024-02-25T07:31:14.000000Z"}, {"uuid": "f22da396-40fb-4011-b961-5b4b7f1184cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/ctinow/156786", "content": "https://ift.tt/7HduGLe\nCVE-2023-48121 | EZVIZ CS-C6N-xxx/CS-CV310-xxx/CS-C6CN-xxx/CS-C3N-xxx prior 5.3.x Build 20230401 Direct Connection Module access control", "creation_timestamp": "2023-12-20T07:32:33.000000Z"}, {"uuid": "826b8f6d-6983-4784-a164-e37f54e8f228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/KrysAMKV_ssHMzBssA4jddAyNcHHHx4Ilu6xfvvFEjTJZhI", "content": "", "creation_timestamp": "2024-06-04T09:06:13.000000Z"}, {"uuid": "55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrew/10453", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:12:35.000000Z"}, {"uuid": "99bd8e19-fc16-49ba-9940-eca3c449e452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/10407", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:11:53.000000Z"}, {"uuid": "e64f6fde-265c-4fd1-b6fa-83a8419f7e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "Telegram/dDLIHBtJ9_N-emYlw0K4JD4hXTAaTtCLuazFpz7C1Io4dA", "content": "", "creation_timestamp": "2024-08-01T22:20:23.000000Z"}, {"uuid": "7d47ff5c-584d-48f9-bb83-2125566b25a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/2058", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:11:53.000000Z"}]}