{"vulnerability": "CVE-2024-2926", "sightings": [{"uuid": "65a816df-f0d6-44c5-95be-3c5a7b07e20b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7811", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aA PoC exploit for CVE-2024-29269 - Telesquare TLR-2005KSH Remote Code Execution (RCE)\nURL\uff1ahttps://github.com/K3ysTr0K3R/CVE-2024-29269-EXPLOIT\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-07-02T00:23:02.000000Z"}, {"uuid": "4dc21eae-b1f9-4178-88c0-049486beb570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-29269", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/d29dbde5-754c-4ca2-8a8b-47f3b9e077f7", "content": "", "creation_timestamp": "2024-09-24T12:13:05.859516Z"}, {"uuid": "99802d82-6b9d-4142-a1f1-16d2eb6cb710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7575", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1ahttps://nvd.nist.gov/vuln/detail/CVE-2024-29269\nURL\uff1ahttps://github.com/Jhonsonwannaa/CVE-2024-29269\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-08T22:08:10.000000Z"}, {"uuid": "9301d07c-c324-4a5e-a3d5-2d40aa95a278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6928", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-29269\nURL\uff1ahttps://github.com/wutalent/CVE-2024-29269\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-03T02:08:03.000000Z"}, {"uuid": "e6bcdcaf-38c7-4aca-b85d-4c98c7f41f10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7026", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aTelesquare TLR-2005KSH_RCE (CVE-2024-29269) Batch scan/exploit\nURL\uff1ahttps://github.com/YongYe-Security/CVE-2024-29269\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-04-12T07:59:39.000000Z"}, {"uuid": "62f92a17-b5d1-478f-bbd7-4ee897422d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "seen", "source": "https://t.me/eXCe_Fixxed/502", "content": "# DD0S CVE List by Layer 3/4/7\n\n##  Layer 3 (Network) - ICMP, IP, NDP\n\n# 2020\n- CVE-2020-16898  &gt; Windows TCP/IP \"Bad Neighbor\" - ICMPv6 ping of death (DoS via BSOD)\n\n##  Layer 4 (Transport) - TCP, UDP\n\n# 2013\n- CVE-2013-5211  &gt; NTP Amplification Attack via 'monlist' (UDP-based)\n\n# 2016\n- CVE-2016-9244  &gt; Cisco VPN IKEv1 flood (UDP port 500 DoS)\n\n# 2018\n- CVE-2018-1000115  &gt; Memcached UDP Amplification (reflection attack)\n\n# 2018\n- CVE-2018-0171  &gt; Cisco Smart Install DoS (TCP port 4786)\n\n##  Layer 7 (Application) - HTTP, NTP, Memcached, API\n\n# 2021\n- CVE-2021-22986  &gt; F5 BIG-IP iControl REST unauth DoS/RCE (API abuse)\n\n# 2023\n- CVE-2023-44487  &gt; HTTP/2 Rapid Reset Attack - stream reset flooding\n\n# 2024\n- CVE-2024-29269  &gt; Telesquare LTE Router Cmd Injection (dapat digunakan untuk DoS chaining) {New Cve Bug}", "creation_timestamp": "2025-08-03T06:11:01.000000Z"}, {"uuid": "a56ff2df-5f75-4723-ab4d-37c32eb3acbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "seen", "source": "https://t.me/eXCe_Fixxed/109130", "content": "# DD0S CVE List by Layer 3/4/7\n\n##  Layer 3 (Network) - ICMP, IP, NDP\n\n# 2020\n- CVE-2020-16898  &gt; Windows TCP/IP \"Bad Neighbor\" - ICMPv6 ping of death (DoS via BSOD)\n\n##  Layer 4 (Transport) - TCP, UDP\n\n# 2013\n- CVE-2013-5211  &gt; NTP Amplification Attack via 'monlist' (UDP-based)\n\n# 2016\n- CVE-2016-9244  &gt; Cisco VPN IKEv1 flood (UDP port 500 DoS)\n\n# 2018\n- CVE-2018-1000115  &gt; Memcached UDP Amplification (reflection attack)\n\n# 2018\n- CVE-2018-0171  &gt; Cisco Smart Install DoS (TCP port 4786)\n\n##  Layer 7 (Application) - HTTP, NTP, Memcached, API\n\n# 2021\n- CVE-2021-22986  &gt; F5 BIG-IP iControl REST unauth DoS/RCE (API abuse)\n\n# 2023\n- CVE-2023-44487  &gt; HTTP/2 Rapid Reset Attack - stream reset flooding\n\n# 2024\n- CVE-2024-29269  &gt; Telesquare LTE Router Cmd Injection (dapat digunakan untuk DoS chaining) {New Cve Bug}", "creation_timestamp": "2025-08-03T06:11:01.000000Z"}, {"uuid": "d51f3a0d-1456-4bd2-a01d-8d0f5f805a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/17705", "content": "CVE-2024-29269: Remote Code Execution PoC\n\nCredit: youtube.com/@FusionSecurity.Official", "creation_timestamp": "2025-05-30T20:47:01.000000Z"}, {"uuid": "c74cb42e-8b5a-4625-8451-f85c2c23be1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "seen", "source": "https://t.me/arpsyndicate/4575", "content": "#ExploitObserverAlert\n\nCVE-2024-29269\n\nDESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to CVE-2024-29269. An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.\n\nFIRST-EPSS: 0.000530000\nARPS-EXPLOITABILITY: 0.7514627", "creation_timestamp": "2024-04-12T09:21:27.000000Z"}, {"uuid": "09cf58b5-2f47-4261-a53a-c75f06032420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/847", "content": "\u200aPoC Releases for Unauthorized RCE Flaw (CVE-2024-29269) Threatens 40K+ Telesquare Routers\n\nhttps://securityonline.info/poc-releases-for-unauthorized-rce-flaw-cve-2024-29269-threatens-40k-telesquare-routers/", "creation_timestamp": "2024-05-23T19:33:15.000000Z"}, {"uuid": "16925da6-2849-47ec-bfa2-4d5f09bb4831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "Telegram/WHOx3EP022MoO9n68-oH6K_sBk0mq7v_XzyFp6afHTHmrJVc", "content": "", "creation_timestamp": "2024-04-24T17:57:53.000000Z"}, {"uuid": "9ff817a8-14e9-4e8d-9d74-dc5aefc0a863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "seen", "source": "https://t.me/arpsyndicate/4932", "content": "#ExploitObserverAlert\n\nCVE-2024-29269\n\nDESCRIPTION: Exploit Observer has 20 entries in 9 file formats related to CVE-2024-29269. An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.\n\nFIRST-EPSS: 0.000540000\nARPS-PRIORITY: 0.9565126", "creation_timestamp": "2024-05-05T20:42:08.000000Z"}, {"uuid": "31ecf0b3-6de9-4eb9-9208-d6fb8deb95af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "seen", "source": "https://t.me/arpsyndicate/4337", "content": "#ExploitObserverAlert\n\nPD/http/cves/2024/CVE-2024-29269\n\nDESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-29269. Telesquare Tlr-2005Ksh is a Sk Telecom Lte router from South Korea's Telesquare company.Telesquare TLR-2005Ksh versions 1.0.0 and 1.1.4 have an unauthorized remote command execution vulnerability. An attacker can exploit this vulnerability to execute system commands without authorization through the Cmd parameter and obtain server permissions.", "creation_timestamp": "2024-04-06T17:59:29.000000Z"}, {"uuid": "b88742e8-082a-4c93-9631-7eba0c412425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1996", "content": "CVE-2024-29269\n*\n\u041c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b TELESQUARE TLR-2005KSH \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445  \u043a\u043e\u043c\u0430\u043d\u0434\n*\n\u0425\u0430\u043d\u0442\u0435\u0440 \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u0447\u0442\u043e \u0435\u0441\u0442\u044c 3307 \u0434\u0435\u0432\u0430\u0439\u0441\u043e\u0432\n*\nPOC exploit", "creation_timestamp": "2024-04-08T21:55:04.000000Z"}, {"uuid": "60bbfdd0-6c3f-401a-9f9b-dc84e95e27b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2248", "content": "CVE-2024-29269\n\nfofa\ntitle=\"Login to TLR-2005KSH\"\n\nGET /cgi-bin/admin.cgi?Command=sysCommand&amp;Cmd=ifconfig HTTP/1.1\n\n#poc #exploit #IoT", "creation_timestamp": "2024-04-05T22:18:24.000000Z"}, {"uuid": "6ad6e08b-461b-401b-a57d-d6a9278459af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "Telegram/wVOSskfc1RYb1Zgawt1gk54ImYsgP6V0IROKC2rpETtWvEBk", "content": "", "creation_timestamp": "2024-04-05T16:43:08.000000Z"}, {"uuid": "8745f479-6f3c-41ab-a81d-ca15eada3361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29269", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10562", "content": "#exploit\n1. CVE-2024-29269:\nTelesquare TLR-2005KSH Unauth RCE\nhttps://github.com/Chocapikk/CVE-2024-29269\n]-&gt; https://github.com/wutalent/CVE-2024-29269/blob/main/index.md\n\n2. CVE-2024-4956:\nNexus Repo Manager 3 Unauth Path Traversal\nhttps://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956", "creation_timestamp": "2024-05-25T13:07:26.000000Z"}]}