{"uuid": "fa564b90-570e-4019-98ec-06e92280bea5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "name": "A Mirai botnet is attempting exploitation in the wild using a new (at least to us) set of CVEs", "description": "A Mirai botnet is attempting exploitation in the wild using a new set of CVEs, focusing mostly on IoT devices. Includes:\n\n- Tenda CVE-2024-41473\n- Draytek CVE-2024-12987\n- HuangDou UTCMS V9 CVE-2024-9916\n- Totolink CVE-2024-2353 CVE-2024-24328 CVE-2024-24329\n- (likely) Four-Faith CVE-2024-9644\n\nSource: The Shadowserver Foundation", "creation_timestamp": "2025-02-12T13:38:55.560603+00:00", "timestamp": "2025-02-12T13:38:55.560603+00:00", "related_vulnerabilities": ["CVE-2024-9644", "CVE-2024-2353", "CVE-2024-9916", "CVE-2024-12987", "CVE-2024-24328", "CVE-2024-24329", "CVE-2024-41473"], "meta": [{"ref": ["https://www.linkedin.com/posts/the-shadowserver-foundation_high-honeypot-http-scanner-events-report-activity-7295374394028154880-ASW-"]}], "author": {"login": "cedric", "name": "C\u00e9dric Bonhomme", "uuid": "af0120d0-3dac-4a6a-974b-a9f33d2a9846"}}
