{"vulnerability": "CVE-2024-57036", "sightings": [{"uuid": "6c132baa-27f9-42b3-ab6f-f16bd6fe6bd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113867210977785280", "content": "", "creation_timestamp": "2025-01-21T16:09:14.122539Z"}, {"uuid": "6ca7d738-b18c-4662-9c7b-cac73d9ffcf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbasokhwy2b", "content": "", "creation_timestamp": "2025-01-21T16:15:59.963739Z"}, {"uuid": "13d2a510-d882-4c45-92a6-de610fc1244f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgbcotdfpr2q", "content": "", "creation_timestamp": "2025-01-21T16:49:38.777527Z"}, {"uuid": "3c6495be-228e-483f-afc3-42cddd20873e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57036", "type": "seen", "source": "https://t.me/cvedetector/15976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57036 - TOTOLINK A810R Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57036 \nPublished : Jan. 21, 2025, 4:15 p.m. | 25\u00a0minutes ago \nDescription : TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command insertion vulnerability in downloadFile.cgi main function. This vulnerability allows an attacker to execute arbitrary commands by sending HTTP request. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T17:48:28.000000Z"}]}