<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-07T07:58:47.953282+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/28652d6c-cd8c-415c-9877-b8c8ecb7b194/export</id>
    <title>28652d6c-cd8c-415c-9877-b8c8ecb7b194</title>
    <updated>2026-05-07T07:58:48.428384+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "28652d6c-cd8c-415c-9877-b8c8ecb7b194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43284", "type": "seen", "source": "https://t.me/cibsecurity/33141", "content": "\u203c CVE-2021-43284 \u203c\n\nAn issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-30T22:34:52.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/28652d6c-cd8c-415c-9877-b8c8ecb7b194/export"/>
    <published>2021-11-30T22:34:52+00:00</published>
  </entry>
</feed>
