{"vulnerability": "CVE-2024-10771", "sightings": [{"uuid": "b02c0f17-671e-427a-adbb-3b2faa368cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10771", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113605876542214022", "content": "", "creation_timestamp": "2024-12-06T12:28:27.075701Z"}, {"uuid": "64ddfae3-d0c0-4218-969c-ad9f3010de2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10771", "type": "seen", "source": "https://t.me/cvedetector/12211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10771 - Due to missing input validation during one step of\", \n  \"Content\": \"CVE ID : CVE-2024-10771 \nPublished : Dec. 6, 2024, 1:15 p.m. | 1\u00a0hour ago \nDescription : Due to missing input validation during one step of the firmware update process, the product  \nis vulnerable to remote code execution. With network access and the user level \u201dService\u201d, an attacker  \ncan execute arbitrary system commands in the root user\u2019s contexts. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T15:37:13.000000Z"}]}