{"vulnerability": "CVE-2024-13030", "sightings": [{"uuid": "ab39a6f2-7a11-4537-a67d-a914ec093534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113736183009466505", "content": "", "creation_timestamp": "2024-12-29T12:47:06.613124Z"}, {"uuid": "e80aa10a-4e54-40b7-a09c-a5133d0fb95a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113738954495833597", "content": "", "creation_timestamp": "2024-12-30T00:31:55.641487Z"}, {"uuid": "f0bda08a-1cad-4e20-8101-870757d45b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-13030", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7e778c2d-cf27-4c9c-9fe6-fc01102b5431", "content": "", "creation_timestamp": "2026-03-12T10:50:26.115478Z"}, {"uuid": "dc9cad64-7fa0-4276-9824-ddb9ac842d85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mhlwkal3ka2m", "content": "", "creation_timestamp": "2026-03-21T21:03:02.926955Z"}, {"uuid": "619f3230-56ee-4883-bf66-3b0f770ef08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13030", "type": "seen", "source": "https://t.me/cvedetector/13910", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13030 - \"D-Link DIR-823G Web Management Remote Access Control Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13030 \nPublished : Dec. 30, 2024, 1:15 a.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T03:25:19.000000Z"}]}