{"vulnerability": "CVE-2023-52038", "sightings": [{"uuid": "96a26cc0-00de-4bb0-95d2-341cc266477f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/arpsyndicate/3016", "content": "#ExploitObserverAlert\n\nCVE-2023-52038\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52038. An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415C80 function.", "creation_timestamp": "2024-01-26T17:37:08.000000Z"}, {"uuid": "2e3461cd-1367-4193-a844-d30781428515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/ctinow/187180", "content": "https://ift.tt/P9NcxrA\nCVE-2023-52038 | Totolink X6000R 9.4.0cu.852_B20230719 sub_415C80 command injection", "creation_timestamp": "2024-02-18T09:11:50.000000Z"}, {"uuid": "0dfe0934-019d-4f4c-898d-f53830c1695a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/ctinow/176420", "content": "https://ift.tt/Y9Lvclq\nCVE-2023-52038 Exploit", "creation_timestamp": "2024-01-31T02:17:07.000000Z"}, {"uuid": "ca687005-4de1-4eb4-8529-f8be98d12930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52038", "type": "seen", "source": "https://t.me/ctinow/173024", "content": "https://ift.tt/XNLhQPf\nCVE-2023-52038", "creation_timestamp": "2024-01-24T19:26:53.000000Z"}]}