{"vulnerability": "CVE-2024-54887", "sightings": [{"uuid": "7dde49eb-9f49-4ef1-bb23-f0c4c2479dc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdipcmt3n2i", "content": "", "creation_timestamp": "2025-01-09T20:17:24.953897Z"}, {"uuid": "0344ab08-80b6-4e60-b73a-bf5839a6c749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/decryptbot.bsky.social/post/3lfojg663w723", "content": "", "creation_timestamp": "2025-01-14T05:29:29.652262Z"}, {"uuid": "462ffc34-769c-4843-92ef-662ec0a37bbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgawgah2ns27", "content": "", "creation_timestamp": "2025-01-21T13:10:06.015125Z"}, {"uuid": "3515c74f-e1ad-4ee5-809f-b7b6022a12d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lga34bcy622j", "content": "", "creation_timestamp": "2025-01-21T05:01:27.288204Z"}, {"uuid": "011ffbaa-0e4e-48d5-a3d8-5764b093f80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lgb2pkd42r32", "content": "", "creation_timestamp": "2025-01-21T14:27:05.932308Z"}, {"uuid": "835be6ad-9be9-44e0-9f9a-6d331f13533b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/cybermaterial.bsky.social/post/3lgbgwxlwqc2d", "content": "", "creation_timestamp": "2025-01-21T18:05:46.612892Z"}, {"uuid": "16b34ff0-0def-43d2-a24b-b68245412fd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/seifreed.bsky.social/post/3lgbr5hxpja2y", "content": "", "creation_timestamp": "2025-01-21T21:08:23.733767Z"}, {"uuid": "d4d4cd93-d298-44bd-94df-f91bf9a1ab76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/neroqc.bsky.social/post/3lgbsz3sfwc2h", "content": "", "creation_timestamp": "2025-01-21T21:41:46.004274Z"}, {"uuid": "3839fd7e-88f6-4729-939a-227a417ce7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-54887", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgcrzilpzk2y", "content": "", "creation_timestamp": "2025-01-22T06:56:42.396016Z"}, {"uuid": "75ba418d-9666-4939-867c-0996c44dafb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lgcza7abe6i2", "content": "", "creation_timestamp": "2025-01-22T09:13:02.321207Z"}, {"uuid": "42da2dfb-1e82-4319-8033-af9697b31133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://t.me/cvedetector/14903", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54887 - TP-Link TL-WR940N DNS Server Buffer Overflow (Remote Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2024-54887 \nPublished : Jan. 9, 2025, 8:15 p.m. | 38\u00a0minutes ago \nDescription : TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:57:20.000000Z"}, {"uuid": "d9ee8b8f-8650-413a-844b-6100f21af97a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1864", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54887\n\ud83d\udd39 Description: TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user.\n\ud83d\udccf Published: 2025-01-09T00:00:00\n\ud83d\udccf Modified: 2025-01-15T20:26:04.335Z\n\ud83d\udd17 References:\n1. http://tp-link.com\n2. https://github.com/JBince/vulnerability-research/tree/main/CVE-2024-54887", "creation_timestamp": "2025-01-15T20:55:04.000000Z"}, {"uuid": "4ba764c8-0614-4c88-b13f-996045c6731b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/7420", "content": "PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887) \u2013 gbhackers.com\n\nWed, 22 Jan 2025 01:08:17", "creation_timestamp": "2025-01-21T21:03:23.000000Z"}, {"uuid": "d71d61a0-7568-486d-8546-f234c0f40e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/1395", "content": "PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887) \u2013 gbhackers.com\n\nWed, 22 Jan 2025 01:08:17", "creation_timestamp": "2025-01-21T21:03:23.000000Z"}, {"uuid": "a1c8911a-543e-4757-b166-9baf8bb27c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/1378", "content": "PoC Exploit Released for TP-Link Code Execution Vulnerability (CVE-2024-54887) \u2013 gbhackers.com\n\nTue, 21 Jan 2025 14:47:15", "creation_timestamp": "2025-01-21T09:03:43.000000Z"}, {"uuid": "42baf220-b074-4f2e-a168-8444d535e781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "Telegram/sOSLcl_JVRn8LR-hcFVCofqaNEuqYDwQYG4OgtKUcxWQC6k", "content": "", "creation_timestamp": "2025-01-21T21:03:20.000000Z"}, {"uuid": "992d76b6-40d8-4a0b-bff9-252545e4bfed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "Telegram/sNb5qaN6ylFfQHFthwWWJbaEVt7VYZFjAgrbiLxt7iii3is", "content": "", "creation_timestamp": "2025-01-21T09:03:40.000000Z"}, {"uuid": "46b4ba0e-4063-40ef-a730-41169f737f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://t.me/LearnExploit/7519", "content": "#exploit\n1. CVE-2024-54887:\nTP-Link TL-WR940N BoF\n\n2. CVE-2024-41570:\nAuthenticated Havoc-Chained-RCE\n\n3. CVE-2025-21298:\nWindows OLE RCE (CVSS 9.8)\n\n\nIR0Day.Today Bax \n@LearnExploit", "creation_timestamp": "2025-01-25T12:35:33.000000Z"}, {"uuid": "4c8d1a40-4380-4d95-a602-83b230590740", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/7386", "content": "PoC Exploit Released for TP-Link Code Execution Vulnerability (CVE-2024-54887) \u2013 gbhackers.com\n\nTue, 21 Jan 2025 14:47:15", "creation_timestamp": "2025-01-21T09:03:43.000000Z"}, {"uuid": "1175d418-b752-453b-9185-42c564960822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11717", "content": "#exploit\n1. CVE-2024-54887:\nTP-Link TL-WR940N BoF\n\n2. CVE-2024-41570:\nAuthenticated Havoc-Chained-RCE\n\n3. CVE-2025-21298:\nWindows OLE RCE (CVSS 9.8)", "creation_timestamp": "2025-01-22T17:35:10.000000Z"}]}