{"vulnerability": "CVE-2024-20148", "sightings": [{"uuid": "cfed46e2-a189-4b26-968b-0fdd3efc5e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113779361382316972", "content": "", "creation_timestamp": "2025-01-06T03:47:55.560892Z"}, {"uuid": "968f7196-719c-4585-8f59-56b62d774045", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2bkr5yyc22", "content": "", "creation_timestamp": "2025-01-06T04:15:38.696177Z"}, {"uuid": "6946540a-a470-4c0a-9b2d-58b9f25e656a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf2d3bb5zr2q", "content": "", "creation_timestamp": "2025-01-06T04:42:47.343006Z"}, {"uuid": "6998fba9-c689-4ac0-81db-ab102cc70622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113782195526765128", "content": "", "creation_timestamp": "2025-01-06T15:48:43.689007Z"}, {"uuid": "9444855c-05ed-4818-8209-9740792516f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/a5165ebe-ef02-4a51-b2a6-2950b3c37690", "content": "", "creation_timestamp": "2025-01-07T07:03:20.063825Z"}, {"uuid": "a5d0e0b6-e41e-4ac4-8456-353e1a6877d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/a30ff14f-a073-49be-8c0c-6b6afd6a19f3", "content": "", "creation_timestamp": "2025-01-07T07:09:05.334532Z"}, {"uuid": "4dfd4c70-b0f5-4637-bd9a-fe3dd12f190b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/158", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-cqhv-985j-2frf\n\ud83d\udd17 Aliases: CVE-2024-20148\n\ud83d\udd39 Details: In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T06:30:45Z\n\ud83d\uddd3\ufe0f Published: 2025-01-06T06:30:45Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-787\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-20148\n2. https://corp.mediatek.com/product-security-bulletin/January-2025", "creation_timestamp": "2025-01-06T06:40:31.000000Z"}, {"uuid": "44b90d97-2b8c-4278-878b-7047ee3c5374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/659", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20148\n\ud83d\udd39 Description: In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.\n\ud83d\udccf Published: 2025-01-06T03:17:51.547Z\n\ud83d\udccf Modified: 2025-01-08T04:55:50.305Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/January-2025", "creation_timestamp": "2025-01-08T05:40:09.000000Z"}, {"uuid": "733e44db-565f-473c-bd0b-bd5c10ea02b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20148", "type": "seen", "source": "https://t.me/cvedetector/14323", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20148 - Cisco Wireless Controller Out-of-Bounds Write Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-20148 \nPublished : Jan. 6, 2025, 4:15 a.m. | 44\u00a0minutes ago \nDescription : In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T06:03:18.000000Z"}]}