{"vulnerability": "CVE-2023-5203", "sightings": [{"uuid": "96627991-840e-411f-b998-ed0b59a0b51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/ctinow/187181", "content": "https://ift.tt/37A4e0p\nCVE-2023-52039 | Totolink X6000R 9.4.0cu.852_B20230719 sub_415AA4 command injection", "creation_timestamp": "2024-02-18T09:11:52.000000Z"}, {"uuid": "1ac9e9ff-ed39-4b5c-93c0-e43fc43088f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5203", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2023/CVE-2023-5203.yaml", "content": "", "creation_timestamp": "2026-02-24T13:21:30.000000Z"}, {"uuid": "6c2ab67b-894c-43b5-82c9-81efc5da21ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/arpsyndicate/2998", "content": "#ExploitObserverAlert\n\nCVE-2023-52039\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52039. An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415AA4 function.", "creation_timestamp": "2024-01-26T16:08:58.000000Z"}, {"uuid": "96a26cc0-00de-4bb0-95d2-341cc266477f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/arpsyndicate/3016", "content": "#ExploitObserverAlert\n\nCVE-2023-52038\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52038. An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415C80 function.", "creation_timestamp": "2024-01-26T17:37:08.000000Z"}, {"uuid": "4cc42854-0f0c-4807-8133-713ab6917976", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5203", "type": "seen", "source": "https://t.me/arpsyndicate/2547", "content": "#ExploitObserverAlert\n\nCVE-2023-5203\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-5203. The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique.\n\nFIRST-EPSS: 0.001900000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-06T14:49:37.000000Z"}, {"uuid": "babe50fd-1d79-43ed-9f2b-06b8f866b549", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5203", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mfumc2ea542w", "content": "", "creation_timestamp": "2026-02-27T21:03:03.353640Z"}, {"uuid": "1f59bf9b-eaaa-4224-a896-d75a150e57bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52032", "type": "seen", "source": "https://t.me/ctinow/175858", "content": "https://ift.tt/0mq9O5w\nCVE-2023-52032 | Totolink EX1200T 4.1.2cu.5232_B20210713 main Privilege Escalation", "creation_timestamp": "2024-01-30T12:16:53.000000Z"}, {"uuid": "2e3461cd-1367-4193-a844-d30781428515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/ctinow/187180", "content": "https://ift.tt/P9NcxrA\nCVE-2023-52038 | Totolink X6000R 9.4.0cu.852_B20230719 sub_415C80 command injection", "creation_timestamp": "2024-02-18T09:11:50.000000Z"}, {"uuid": "0dfe0934-019d-4f4c-898d-f53830c1695a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/ctinow/176420", "content": "https://ift.tt/Y9Lvclq\nCVE-2023-52038 Exploit", "creation_timestamp": "2024-01-31T02:17:07.000000Z"}, {"uuid": "7a42b09a-bc7e-40a2-b59d-952e7768e4b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/ctinow/176338", "content": "https://ift.tt/Hp4cvoq\nCVE-2023-52039 Exploit", "creation_timestamp": "2024-01-30T23:16:44.000000Z"}, {"uuid": "2667d9d9-024b-4701-b133-7cc15cd37288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52030", "type": "seen", "source": "https://t.me/ctinow/175848", "content": "https://ift.tt/xOhwPSJ\nCVE-2023-52030 | Totolink A3700R 9.1.2u.5822_B20200513 setOpModeCfg Privilege Escalation", "creation_timestamp": "2024-01-30T11:46:46.000000Z"}, {"uuid": "2147b5d4-3f3e-4e3c-88e2-579e281d999e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52031", "type": "seen", "source": "https://t.me/ctinow/175849", "content": "https://ift.tt/I0RZUWe\nCVE-2023-52031 | Totolink A3700R 9.1.2u.5822_B20200513 UploadFirmwareFile Privilege Escalation", "creation_timestamp": "2024-01-30T11:46:47.000000Z"}, {"uuid": "872a56c6-7e02-48b5-ad85-b63d5160e7a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5203", "type": "seen", "source": "https://t.me/ctinow/170205", "content": "https://ift.tt/u03Elf4\nCVE-2023-5203 | WP Sessions Time Monitoring Full Automatic Plugin up to 1.0.8 on WordPress Query Parameter sql injection", "creation_timestamp": "2024-01-19T14:11:34.000000Z"}, {"uuid": "7ee7bc09-9d51-4653-bd4e-84448e8f0e1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5203", "type": "seen", "source": "https://t.me/ctinow/159433", "content": "https://ift.tt/VNSqnJl\nCVE-2023-5203", "creation_timestamp": "2023-12-26T20:26:45.000000Z"}, {"uuid": "3855d0d9-3d86-426b-a343-db653c60ea49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/ctinow/173025", "content": "https://ift.tt/aBzwKPf\nCVE-2023-52039", "creation_timestamp": "2024-01-24T19:26:54.000000Z"}, {"uuid": "ca687005-4de1-4eb4-8529-f8be98d12930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/ctinow/173024", "content": "https://ift.tt/XNLhQPf\nCVE-2023-52038", "creation_timestamp": "2024-01-24T19:26:53.000000Z"}, {"uuid": "2f0f1c13-2bba-47de-b358-5c8c3541480b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52030", "type": "seen", "source": "https://t.me/ctinow/169468", "content": "https://ift.tt/oq0GagT\nCVE-2023-52030 Exploit", "creation_timestamp": "2024-01-17T21:16:33.000000Z"}, {"uuid": "65b1954a-55f2-4507-9048-c3b2eadc0615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52031", "type": "seen", "source": "https://t.me/ctinow/169467", "content": "https://ift.tt/hfv0Ajp\nCVE-2023-52031 Exploit", "creation_timestamp": "2024-01-17T21:16:31.000000Z"}, {"uuid": "d2549f3d-b1ab-4b69-975d-8591e004d060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52032", "type": "seen", "source": "https://t.me/ctinow/169465", "content": "https://ift.tt/nYy9ZUI\nCVE-2023-52032 Exploit", "creation_timestamp": "2024-01-17T21:16:25.000000Z"}, {"uuid": "9f4df03c-67e0-4968-894e-d18ef98ef7b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5203", "type": "seen", "source": "https://t.me/ctinow/162084", "content": "https://ift.tt/ZAGH7SM\nCVE-2023-5203 Exploit", "creation_timestamp": "2024-01-02T23:16:50.000000Z"}]}