{"vulnerability": "CVE-2024-4199", "sightings": [{"uuid": "91b7a4d1-1e0d-4b13-a178-e141718f9c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113461448821757621", "content": "", "creation_timestamp": "2024-11-11T00:18:34.764984Z"}, {"uuid": "ebab56b5-b7e0-49e5-8c71-6e5c8b425836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41996", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}, {"uuid": "416b7cdc-38ec-4457-a763-106564ac4a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41996", "type": "seen", "source": "https://gist.github.com/gszr/a40573432a259a7a925124168844a175", "content": "", "creation_timestamp": "2025-11-18T19:05:17.000000Z"}, {"uuid": "5feff5f2-c9c6-4ec3-be01-5738edee8c8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41997", "type": "published-proof-of-concept", "source": "Telegram/EO89pEeaC3Yk2tbcE_MIZIoOoBKLb4G0XE8SeMkGeGz1h_E", "content": "", "creation_timestamp": "2026-01-01T07:00:27.000000Z"}, {"uuid": "e6b80b5a-1fff-44ff-b0a2-adf32518ce31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41996", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-071-03", "content": "", "creation_timestamp": "2026-03-12T11:00:00.000000Z"}, {"uuid": "df14237c-9fc2-4b6b-a689-96327bf96a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8349", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPoC for the CVE-2024-41992 (RCE on devices running WiFi-TestSuite-DUT)\nURL\uff1ahttps://github.com/fj016/CVE-2024-41992-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-23T23:52:29.000000Z"}, {"uuid": "9d0e6ba6-7b84-45f2-9f3e-ec12582b224f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41997", "type": "published-proof-of-concept", "source": "Telegram/lAdyWIii7qOqzP25MDlOiugnGJyq509QFKqLPj04_1zA-jM", "content": "", "creation_timestamp": "2026-01-01T09:00:05.000000Z"}, {"uuid": "c531327f-2393-4198-8875-7f0680f102ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "https://t.me/cvedetector/10449", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41992 - Wi-Fi Alliance Wfa_dut Remote Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-41992 \nPublished : Nov. 11, 2024, 1:15 a.m. | 17\u00a0minutes ago \nDescription : Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T02:43:04.000000Z"}, {"uuid": "be3b5527-d625-46dc-ac08-aee7b53d7936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/646", "content": "#exploit\n1. CVE-2024-41992:\nArcadyan FMIMG51AX000J (WiFi Alliance) RCE\nhttps://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce\n\n2. CVE-2024-48930:\nRemote Private key extraction over ECDH\n(11 session..)\nhttps://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", "creation_timestamp": "2024-10-29T10:48:04.000000Z"}, {"uuid": "f03c9b3e-492e-4ae1-9232-b47ded5631ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41997", "type": "seen", "source": "https://t.me/cvedetector/7823", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41997 - Warp Terminal Docker Integration Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41997 \nPublished : Oct. 14, 2024, 4:15 p.m. | 37\u00a0minutes ago \nDescription : An issue was discovered in version of Warp Terminal prior to 2024.07.18 (v0.2024.07.16.08.02). A command injection vulnerability exists in the Docker integration functionality. An attacker can create a specially crafted hyperlink using the `warp://action/docker/open_subshell` intent that when clicked by the victim results in command execution on the victim's machine. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-14T19:10:58.000000Z"}, {"uuid": "952585b3-398c-40b5-8b3c-ec6c30c003c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41999", "type": "seen", "source": "https://t.me/cvedetector/6644", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41999 - Smart-tab Android Debug Code Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41999 \nPublished : Sept. 30, 2024, 8:15 a.m. | 29\u00a0minutes ago \nDescription : Smart-tab Android app installed April 2023 or earlier contains an active debug code vulnerability. If this vulnerability is exploited, an attacker with physical access to the device may exploit the debug function to gain access to the OS functions, escalate the privilege, change the device's settings, or spoof devices in other rooms. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T10:48:22.000000Z"}, {"uuid": "5fdf179c-6442-40ed-8a2c-80eb8198e194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41990", "type": "seen", "source": "https://t.me/cvedetector/2693", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41990 - Django URLize Filter Regular Expression Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41990 \nPublished : Aug. 7, 2024, 3:15 p.m. | 24\u00a0minutes ago \nDescription : An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T17:48:18.000000Z"}, {"uuid": "d6f6f795-b7cc-4e10-8ffe-9e6585e6435b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41995", "type": "seen", "source": "https://t.me/cvedetector/2542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41995 - Epson JavaTM TLS Insecure Default Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41995 \nPublished : Aug. 6, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T09:59:23.000000Z"}, {"uuid": "27d575f7-b3ed-4d9f-9dbb-f71758e6164e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41996", "type": "seen", "source": "https://t.me/cvedetector/4101", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41996 - Apache OpenSSL SSL/TLS Resource Exhaustion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41996 \nPublished : Aug. 26, 2024, 6:15 a.m. | 23\u00a0minutes ago \nDescription : Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T08:41:30.000000Z"}, {"uuid": "f192d276-4843-40db-9ec6-97f886fc4454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41991", "type": "seen", "source": "https://t.me/cvedetector/2689", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41991 - Django Unicode Denial-of-Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41991 \nPublished : Aug. 7, 2024, 3:15 p.m. | 24\u00a0minutes ago \nDescription : An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T17:48:14.000000Z"}, {"uuid": "972dce19-9fff-4dba-afed-ac01a878956f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "https://t.me/thehackernews/5788", "content": "Attention: CVE-2024-41992 #vulnerability in Wi-Fi Test Suite could give attackers full control over Arcadyan routers. The flaw allows for command injection, enabling full administrative access. \n \nFind details here \u2192 https://thehackernews.com/2024/10/researchers-discover-command-injection.html", "creation_timestamp": "2024-10-25T15:44:33.000000Z"}, {"uuid": "dea6fd43-4d8e-4313-a726-0b0fcf3c1205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "Telegram/OzrGO4ZvS4SBAblg-DhfWJkZQcfYypqKXdZ6RaowoLRvhA", "content": "", "creation_timestamp": "2024-10-25T19:07:32.000000Z"}, {"uuid": "e3c701d3-2817-41c1-83a9-0d784304a941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "https://t.me/KomunitiSiber/2776", "content": "Researchers Discover Command Injection Flaw in Wi-Fi Alliance's Test Suite\nhttps://thehackernews.com/2024/10/researchers-discover-command-injection.html\n\nA security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges.\nThe CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers.\n\"This flaw allows an unauthenticated local attacker to", "creation_timestamp": "2024-10-25T17:14:31.000000Z"}, {"uuid": "71a9005d-5a5c-4e4c-b451-c3ce7f84d863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6367", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0432\u043e\u0434\u0430 \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 Test Suite \u043e\u0442 Wi-Fi Alliance.\n\nWi-Fi Test Suite - \u044d\u0442\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u0430\u044f Wi-Fi Alliance, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u0443\u0435\u0442 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0438\u043b\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Wi-Fi.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u044f \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b, \u043f\u043e\u043b\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0442\u043e\u043b\u044c\u043a\u043e \u0435\u0433\u043e \u0447\u043b\u0435\u043d\u0430\u043c.\n\n\u041e\u0448\u0438\u0431\u043a\u0430, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-41992, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c Wi-Fi Test Suite, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b, \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0441  \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, CERT/CC \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043a\u043e\u0434 \u043e\u0442 Wi-Fi Alliance \u0431\u044b\u043b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043d\u0430 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 Arcadyan FMIMG51AX000J.\n\nSSD Secure Disclosure, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0432\u0448\u0430\u044f \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0435\u0449\u0435 \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2024 \u0433\u043e\u0434\u0430, \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 Wi-Fi Alliance \u043e \u043d\u0435\u0439 \u0435\u0449\u0435 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 2024 \u0433\u043e\u0434\u0430.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a fj016, \u0443\u0436\u0435\u00a0\u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u043b PoC.\n\n\nCERT/CC \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0432 \u0447\u0435\u0440\u0435\u0437 Wi-Fi Test Suite \u043f\u043e\u043b\u043d\u044b\u0439 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438, \u043d\u0430\u0440\u0443\u0448\u0430\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0443 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0441\u043b\u0443\u0436\u0431 \u0438\u043b\u0438 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0441\u0431\u0440\u0430\u0441\u044b\u0432\u0430\u0442\u044c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e.\n\n\u0412\u0441\u0435 \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u0435\u0440\u0435\u0431\u043e\u044f\u043c \u0432 \u0440\u0430\u0431\u043e\u0442\u0435, \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0443\u0442\u0440\u0430\u0442\u0435 \u0441\u0432\u044f\u0437\u0438 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e\u0439 \u0441\u0435\u0442\u0438.\n\n\u0412 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u0442 \u0442\u0430\u0439\u0432\u0430\u043d\u044c\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 \u0434\u0440\u0443\u0433\u0438\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c, \u0432\u043a\u043b\u044e\u0447\u0438\u0432\u0448\u0438\u043c Wi-Fi Test Suite, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043b\u0438\u0431\u043e \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0443\u0434\u0430\u043b\u0438\u0442\u044c \u0435\u0433\u043e \u0438\u0437 \u0441\u0432\u043e\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432, \u043b\u0438\u0431\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 9.0 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0440\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.", "creation_timestamp": "2024-10-28T18:00:07.000000Z"}, {"uuid": "2d091499-7cc9-4f90-9d7a-dee44fd3f271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/759", "content": "\u200aPoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model\n\nhttps://securityonline.info/poc-exploit-released-for-rce-0-day-cve-2024-41992-in-arcadyan-fmimg51ax000j-model/", "creation_timestamp": "2024-08-22T08:53:06.000000Z"}, {"uuid": "7f20a501-10be-4df3-b872-388cef74bee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "Telegram/mz8dXrlRZcQQ9mqao0wrGqARhroVChICX7ulR6NaElYBgQ", "content": "", "creation_timestamp": "2024-10-25T20:29:28.000000Z"}, {"uuid": "afcc83b6-0dd9-46b4-91e6-d0103bb61078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/10926", "content": "\u200aPoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model\n\nhttps://securityonline.info/poc-exploit-released-for-rce-0-day-cve-2024-41992-in-arcadyan-fmimg51ax000j-model/", "creation_timestamp": "2024-08-22T12:21:40.000000Z"}, {"uuid": "e6cdff9b-b294-45a3-a952-cea9738261ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "seen", "source": "https://t.me/xakep_ru/16611", "content": "\u0412 \u0442\u0435\u0441\u0442\u043e\u0432\u043e\u043c \u043d\u0430\u0431\u043e\u0440\u0435 Wi-Fi Alliance \u043d\u0430\u0448\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \u041a\u043e\u0434 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 Arcadyan\n\n\u041d\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043c\u044b\u0439 \u0418\u0411-\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 \u0442\u0430\u0439\u0432\u0430\u043d\u044c\u0441\u043a\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Arcadyan \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 (CVE-2024-41992), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c. \u041e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0440\u043e\u0443\u0442\u0435\u0440\u044b \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043a\u043e\u0434 Wi-Fi Test Suite, \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 Wi-Fi Alliance \u0438 \u0432\u043e\u043e\u0431\u0449\u0435 \u043d\u0435 \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445.\n\nhttps://xakep.ru/2024/10/28/cve-2024-41992/", "creation_timestamp": "2024-10-28T15:38:25.000000Z"}, {"uuid": "7fcbbccc-ee60-446f-950e-cf7bdfcf10ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11352", "content": "#exploit\n1. CVE-2024-41992:\nArcadyan FMIMG51AX000J (WiFi Alliance) RCE\nhttps://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce\n\n2. CVE-2024-26926:\nLinux kernel bug in Binder component\nhttps://github.com/MaherAzzouzi/LinuxKernel-nday/tree/main/CVE-2024-26926\n\n3. CVE-2024-48930:\nRemote Private key extraction over ECDH\n(11 session..)\nhttps://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", "creation_timestamp": "2024-10-30T17:37:26.000000Z"}, {"uuid": "c0415330-5272-4d1c-96b6-d195bcce9916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41992", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4904", "content": "#exploit\n1. CVE-2024-41992:\nArcadyan FMIMG51AX000J (WiFi Alliance) RCE\nhttps://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce\n\n2. CVE-2024-48930:\nRemote Private key extraction over ECDH\n(11 session..)\nhttps://github.com/cryptocoinjs/secp256k1-node/security/advisories/GHSA-584q-6j8j-r5pm", "creation_timestamp": "2024-10-30T07:05:32.000000Z"}]}