{"vulnerability": "CVE-2024-12987", "sightings": [{"uuid": "3f1ca783-717e-4094-858c-316c98ef2c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecf5im54q2e", "content": "", "creation_timestamp": "2024-12-27T16:15:55.697250Z"}, {"uuid": "2d7a391d-3e67-4594-8528-871945194573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://infosec.exchange/users/shadowserver/statuses/113990205373134629", "content": "", "creation_timestamp": "2025-02-12T09:28:20.078949Z"}, {"uuid": "b29ae6b7-1422-41c7-bf11-b815bd024937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lhxudxq2lk2x", "content": "", "creation_timestamp": "2025-02-12T09:29:27.868579Z"}, {"uuid": "3e90ed85-b76b-4ed7-8a3e-936f4cc98986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lhxudxqah22x", "content": "", "creation_timestamp": "2025-02-12T09:29:28.762448Z"}, {"uuid": "bc07c306-575b-4c6f-b574-b098713d867c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/shadowserver.bsky.social/post/3lhxudxqcfk2x", "content": "", "creation_timestamp": "2025-02-12T09:29:29.617641Z"}, {"uuid": "424ea907-125c-49a4-a76e-7338175213bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "e9757fc0-bb0f-4429-87b7-fdbef99fe3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "d3bd9010-4e91-42be-a1a1-b34ee901c7e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "99238862-c09f-4c5e-a39e-10cf675b8b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3li63y6cent2a", "content": "", "creation_timestamp": "2025-02-14T21:02:00.379838Z"}, {"uuid": "ffd9467d-a860-484e-9ee3-93c41d207f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "da177711-7a91-4570-a3e5-b8078ab95251", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpkhhfvp6k2g", "content": "", "creation_timestamp": "2025-05-19T20:55:41.948110Z"}, {"uuid": "5b5ada00-7473-4310-8cb6-05789910c409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lpcwgityxf2c", "content": "", "creation_timestamp": "2025-05-16T21:02:19.778538Z"}, {"uuid": "5c9ce54b-9af1-459d-b7d3-dbfffa51bb5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lpcasmrubt2x", "content": "", "creation_timestamp": "2025-05-16T14:35:23.134376Z"}, {"uuid": "81236b66-7fe8-4460-a141-cfadf7837149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "7ffcfa6f-af37-4d89-b187-f57eae7a9ea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "MISP/053ca026-a56e-47a6-9d17-dd5021a065a4", "content": "", "creation_timestamp": "2025-04-23T09:42:59.000000Z"}, {"uuid": "469c1dd9-c121-4b0e-af4f-8ebe4bef3c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3lpevytnwg22y", "content": "", "creation_timestamp": "2025-05-17T16:00:05.520054Z"}, {"uuid": "79ba33ff-7d22-495a-a2d5-2edf8159d405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "c444723c-1822-45fe-a01a-02735b9ad6c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "4226e82b-fc13-4835-bb38-f90048a50b8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lpujox2lqx24", "content": "", "creation_timestamp": "2025-05-23T21:02:25.629589Z"}, {"uuid": "54336fb6-d008-4ede-9e61-ab7c1488eefc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/465", "content": "CVE-2024-12987 \n*\nDrayTek Gateways Vulnerable to Remote Command Injection\nPOC", "creation_timestamp": "2025-01-10T08:17:28.000000Z"}, {"uuid": "229cc163-6592-4f8d-91ba-2fd200492989", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lpa2xf52vt2x", "content": "", "creation_timestamp": "2025-05-15T17:45:20.587863Z"}, {"uuid": "ddb61797-85f2-49a1-a56d-f6f73d865680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4016556", "content": "", "creation_timestamp": "2025-05-15T18:36:31.971483Z"}, {"uuid": "ab0520fb-e444-4ba0-9b6c-24f614e7013f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpad65fwr222", "content": "", "creation_timestamp": "2025-05-15T20:12:19.029989Z"}, {"uuid": "022f761c-8910-494c-bbde-f7e218103282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lpagkmi5ci2b", "content": "", "creation_timestamp": "2025-05-15T21:12:57.431673Z"}, {"uuid": "a57b9131-1ccc-43b5-a952-f79732914d14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:14.000000Z"}, {"uuid": "dc3fa7da-79f8-431f-a4e9-0066913749b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fa564b90-570e-4019-98ec-06e92280bea5", "content": "", "creation_timestamp": "2025-02-12T13:38:55.560603Z"}, {"uuid": "f421c5fb-9e9a-40bb-8d21-f7e61f21b908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "https://t.me/cvedetector/13786", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12987 - DrayTek Vigor2960/Vigor300B Web Management Interface Os Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12987 \nPublished : Dec. 27, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T17:41:58.000000Z"}, {"uuid": "212cc3c3-40f3-4cee-9509-45e5ef6bd715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2469", "content": "CVE-2024-12987 \n*\nDrayTek Gateways Vulnerable to Remote Command Injection\nPOC", "creation_timestamp": "2025-01-01T05:22:07.000000Z"}, {"uuid": "b77e8293-60ce-473b-bc49-839881bc63f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "622d496d-eeba-4afb-8e8f-0476b2da6573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "seen", "source": "MISP/053ca026-a56e-47a6-9d17-dd5021a065a4", "content": "", "creation_timestamp": "2025-08-16T14:30:35.000000Z"}, {"uuid": "7b54fb52-30ec-4fc8-ae22-40ec116dcbae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-12987", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/4307b145-b847-4e6e-95e2-73fbac1d3256", "content": "", "creation_timestamp": "2026-02-02T12:26:01.216196Z"}, {"uuid": "05989c08-69bb-4fcb-b5ef-f3bed60393a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12987", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16339", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12987\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.\n\ud83d\udccf Published: 2024-12-27T16:00:13.600Z\n\ud83d\udccf Modified: 2025-05-14T17:03:33.399Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.289380\n2. https://vuldb.com/?ctiid.289380\n3. https://vuldb.com/?submit.468795\n4. https://netsecfish.notion.site/Command-Injection-in-apmcfgupload-endpoint-for-DrayTek-Gateway-Devices-1676b683e67c8040b7f1f0ffe29ce18f?pvs=4", "creation_timestamp": "2025-05-14T17:32:10.000000Z"}]}