{"vulnerability": "CVE-2024-3181", "sightings": [{"uuid": "9528d11b-996c-4309-b102-4f71eb1049e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "f441a880-93ee-407d-8047-4bb4954404a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "seen", "source": "https://t.me/arpsyndicate/4961", "content": "#ExploitObserverAlert\n\nCVE-2024-31819\n\nDESCRIPTION: Exploit Observer has 12 entries in 7 file formats related to CVE-2024-31819. An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.\n\nFIRST-EPSS: 0.002530000\nARPS-PRIORITY: 0.8368503", "creation_timestamp": "2024-05-28T09:54:17.000000Z"}, {"uuid": "e19b081a-499f-43cd-9303-9de1f8e7272d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:03.000000Z"}, {"uuid": "d8d92305-44fd-43c1-86d0-941acddc4260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6996", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aUnauthenticated Remote Code Execution (RCE) Vulnerability in WWBNIndex Plugin of AVideo Platform from 12.4 to 14.2\nURL\uff1ahttps://github.com/Chocapikk/CVE-2024-31819\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-09T19:18:55.000000Z"}, {"uuid": "cea193fb-1ec9-465f-8ba4-fa230ca917d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:02.000000Z"}, {"uuid": "681788b4-6e6f-4812-a2ec-f04689096dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/avideo_wwbnindex_unauth_rce.rb", "content": "", "creation_timestamp": "2024-05-21T18:44:31.000000Z"}, {"uuid": "caa9b871-fc10-44aa-bb44-12db98a2c478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "published-proof-of-concept", "source": "Telegram/OTQhzFe9k7_TfOGT_LLvJBoHgNc6iIc30vKSTmKS_ex9MQ", "content": "", "creation_timestamp": "2024-04-10T06:02:35.000000Z"}, {"uuid": "68bf9c3a-2469-42ba-a41e-5b37e71e361a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "seen", "source": "https://t.me/arpsyndicate/4957", "content": "#ExploitObserverAlert\n\nCVE-2024-31819\n\nDESCRIPTION: Exploit Observer has 11 entries in 7 file formats related to CVE-2024-31819. An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execute arbitrary code via the systemRootPath parameter of the submitIndex.php component.\n\nFIRST-EPSS: 0.002530000\nARPS-PRIORITY: 0.7528162", "creation_timestamp": "2024-05-23T01:14:32.000000Z"}, {"uuid": "3d7d3df4-a476-4ffd-abc4-0adac46ef062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31819", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2282", "content": "https://github.com/Chocapikk/CVE-2024-31819\n\nUnauthenticated Remote Code Execution (RCE) Vulnerability in WWBNIndex Plugin of AVideo Platform from 12.4 to 14.2\n#github #exploit", "creation_timestamp": "2024-04-10T03:56:02.000000Z"}]}