{"vulnerability": "CVE-2024-46429", "sightings": [{"uuid": "4b8b4bed-6c7a-49a1-a318-54025e1a8a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46429", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981105527920026", "content": "", "creation_timestamp": "2025-02-10T18:54:14.445237Z"}, {"uuid": "5501d0ee-dcc0-4c34-b31e-7a626a9a10bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46429", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981122747611903", "content": "", "creation_timestamp": "2025-02-10T18:58:29.734004Z"}, {"uuid": "0a28fd9a-66cf-4b94-8053-6eafa244aadf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46429", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu7asd3p2x", "content": "", "creation_timestamp": "2025-02-10T19:16:10.835216Z"}, {"uuid": "7e60eff2-4d08-4b6d-9198-8dc84399d08e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46429", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhu5why6uw2q", "content": "", "creation_timestamp": "2025-02-10T22:10:16.114199Z"}, {"uuid": "9f6264d1-2657-4b91-91cc-a933b6fed9c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46429", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113982028651260452", "content": "", "creation_timestamp": "2025-02-10T22:48:53.423069Z"}, {"uuid": "0363578a-fbe7-4fe1-aa77-d3bc9dce919d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46429", "type": "seen", "source": "https://t.me/cvedetector/17593", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46429 - Tenda W18E Hardcoded Credentials Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-46429 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : A hardcoded credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticated remote attackers to access the web management portal using a default guest account with administrative privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:41.000000Z"}]}