<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T05:07:33.624845+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/024ccd6d-8a1d-45ca-b269-c717bcecba90/export</id>
    <title>024ccd6d-8a1d-45ca-b269-c717bcecba90</title>
    <updated>2026-05-09T05:07:34.031572+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "024ccd6d-8a1d-45ca-b269-c717bcecba90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3298", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:19:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/024ccd6d-8a1d-45ca-b269-c717bcecba90/export"/>
    <published>2022-11-11T05:19:44+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ddeec860-ebff-4aec-9bf7-c71773d02963/export</id>
    <title>ddeec860-ebff-4aec-9bf7-c71773d02963</title>
    <updated>2026-05-09T05:07:34.031485+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ddeec860-ebff-4aec-9bf7-c71773d02963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3299", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:28:48.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ddeec860-ebff-4aec-9bf7-c71773d02963/export"/>
    <published>2022-11-11T05:28:48+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dba661e3-891c-483d-9723-1f297e377097/export</id>
    <title>dba661e3-891c-483d-9723-1f297e377097</title>
    <updated>2026-05-09T05:07:34.031407+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dba661e3-891c-483d-9723-1f297e377097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3300", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:37:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dba661e3-891c-483d-9723-1f297e377097/export"/>
    <published>2022-11-11T05:37:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4cb35dc3-b3cb-493d-8c58-9deb98068939/export</id>
    <title>4cb35dc3-b3cb-493d-8c58-9deb98068939</title>
    <updated>2026-05-09T05:07:34.031315+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4cb35dc3-b3cb-493d-8c58-9deb98068939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3441", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-17T13:07:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4cb35dc3-b3cb-493d-8c58-9deb98068939/export"/>
    <published>2022-11-17T13:07:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/47dee084-bc6d-4778-a274-0a502ce370a9/export</id>
    <title>47dee084-bc6d-4778-a274-0a502ce370a9</title>
    <updated>2026-05-09T05:07:34.031229+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "47dee084-bc6d-4778-a274-0a502ce370a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1407", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]", "creation_timestamp": "2022-11-19T07:58:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/47dee084-bc6d-4778-a274-0a502ce370a9/export"/>
    <published>2022-11-19T07:58:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/265b81c2-046b-437a-a944-536da90187a4/export</id>
    <title>265b81c2-046b-437a-a944-536da90187a4</title>
    <updated>2026-05-09T05:07:34.031142+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "265b81c2-046b-437a-a944-536da90187a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2472", "content": "#CVE-2022\nExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nhttps://github.com/gigaryte/cve-2022-31898\n\n@BlueRedTeam", "creation_timestamp": "2022-11-19T20:51:11.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/265b81c2-046b-437a-a944-536da90187a4/export"/>
    <published>2022-11-19T20:51:11+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f9e91b18-6dbb-4915-b1b4-810bfad44449/export</id>
    <title>f9e91b18-6dbb-4915-b1b4-810bfad44449</title>
    <updated>2026-05-09T05:07:34.031040+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f9e91b18-6dbb-4915-b1b4-810bfad44449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/professional_c_h/1858", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]\n\nChannel:\n@Professional_c_h\n@card_crack_hack", "creation_timestamp": "2022-12-02T11:06:09.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f9e91b18-6dbb-4915-b1b4-810bfad44449/export"/>
    <published>2022-12-02T11:06:09+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9a315cc0-c630-48a3-959b-9ff0be3bc753/export</id>
    <title>9a315cc0-c630-48a3-959b-9ff0be3bc753</title>
    <updated>2026-05-09T05:07:34.030906+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9a315cc0-c630-48a3-959b-9ff0be3bc753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7155", "content": "#exploit\n1. CVE-2022-41352:\nZimbra &amp;lt;9.0.0.p27 - Unauthenticated RCE\nhttps://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce\n\n2. CVE-2022-3949:\nXSS in Simple Cashiering System\nhttps://github.com/maikroservice/CVE-2022-3949\n\n3. CVE-2022-31898:\nCommand injection for GL-iNet routers with firm. &amp;lt;3.215\nhttps://github.com/gigaryte/cve-2022-31898", "creation_timestamp": "2022-12-21T05:02:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9a315cc0-c630-48a3-959b-9ff0be3bc753/export"/>
    <published>2022-12-21T05:02:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a061c1f0-cbd3-46de-9a9f-fcaa2db44221/export</id>
    <title>a061c1f0-cbd3-46de-9a9f-fcaa2db44221</title>
    <updated>2026-05-09T05:07:34.026691+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a061c1f0-cbd3-46de-9a9f-fcaa2db44221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15399", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31898\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were discovered to contain multiple command injection vulnerabilities via the ping_addr and trace_addr function parameters.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T18:27:47.420Z\n\ud83d\udd17 References:\n1. https://boschko.ca/glinet-router", "creation_timestamp": "2025-05-07T19:22:38.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a061c1f0-cbd3-46de-9a9f-fcaa2db44221/export"/>
    <published>2025-05-07T19:22:38+00:00</published>
  </entry>
</feed>
