{"vulnerability": "CVE-2024-23309", "sightings": [{"uuid": "a8c4f52c-48d8-4fb2-8f57-bc864c9b5058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23309", "type": "seen", "source": "https://t.me/cvedetector/9434", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23309 - LevelOne WBR-6012 Router Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-23309 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:52:10.000000Z"}]}