{"vulnerability": "CVE-2024-0920", "sightings": [{"uuid": "3bcfb805-4b35-45f1-8468-38d57f1a6eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0920", "type": "seen", "source": "https://t.me/ctinow/174111", "content": "https://ift.tt/tScpWOV\nCVE-2024-0920", "creation_timestamp": "2024-01-26T10:31:24.000000Z"}, {"uuid": "f0eb5360-d305-497f-974a-0f89a0cd8739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0920", "type": "seen", "source": "https://t.me/arpsyndicate/3298", "content": "#ExploitObserverAlert\n\nCVE-2024-0920\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0920. A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It has been declared as critical. This vulnerability affects unknown code of the file /admin_ping.htm of the component POST Request Handler. The manipulation of the argument ipv4_ping/ipv6_ping leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252124. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.", "creation_timestamp": "2024-01-28T13:51:19.000000Z"}, {"uuid": "5de5a50b-1322-4415-aeb0-12600df0632a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0920", "type": "seen", "source": "https://t.me/ctinow/178310", "content": "https://ift.tt/2fbj9Sz\nCVE-2024-0920 Exploit", "creation_timestamp": "2024-02-02T23:16:24.000000Z"}, {"uuid": "06540d4f-54d1-4190-813a-309f3ec9fa03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0920", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18598", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-0920\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It has been declared as critical. This vulnerability affects unknown code of the file /admin_ping.htm of the component POST Request Handler. The manipulation of the argument ipv4_ping/ipv6_ping leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252124. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2024-01-26T08:08:36.975Z\n\ud83d\udccf Modified: 2025-06-17T14:27:29.228Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.252124\n2. https://vuldb.com/?ctiid.252124\n3. https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8?pvs=4", "creation_timestamp": "2025-06-17T14:40:06.000000Z"}, {"uuid": "d82d3326-c677-41b8-a3bb-4874bc987824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0920", "type": "seen", "source": "https://t.me/ctinow/174884", "content": "https://ift.tt/8S56OW4\nCVE-2024-0920 | TRENDnet TEW-822DRE 1.03B02 POST Request /admin_ping.htm ipv4_ping/ipv6_ping command injection", "creation_timestamp": "2024-01-28T10:26:52.000000Z"}]}