<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-10T22:00:26.973862+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/835be6ad-9be9-44e0-9f9a-6d331f13533b/export</id>
    <title>835be6ad-9be9-44e0-9f9a-6d331f13533b</title>
    <updated>2026-05-10T22:00:27.178654+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "835be6ad-9be9-44e0-9f9a-6d331f13533b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/cybermaterial.bsky.social/post/3lgbgwxlwqc2d", "content": "", "creation_timestamp": "2025-01-21T18:05:46.612892Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/835be6ad-9be9-44e0-9f9a-6d331f13533b/export"/>
    <published>2025-01-21T18:05:46.612892+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/42baf220-b074-4f2e-a168-8444d535e781/export</id>
    <title>42baf220-b074-4f2e-a168-8444d535e781</title>
    <updated>2026-05-10T22:00:27.178570+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "42baf220-b074-4f2e-a168-8444d535e781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "Telegram/sOSLcl_JVRn8LR-hcFVCofqaNEuqYDwQYG4OgtKUcxWQC6k", "content": "", "creation_timestamp": "2025-01-21T21:03:20.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/42baf220-b074-4f2e-a168-8444d535e781/export"/>
    <published>2025-01-21T21:03:20+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4ba764c8-0614-4c88-b13f-996045c6731b/export</id>
    <title>4ba764c8-0614-4c88-b13f-996045c6731b</title>
    <updated>2026-05-10T22:00:27.178456+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4ba764c8-0614-4c88-b13f-996045c6731b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/7420", "content": "PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887) \u2013 gbhackers.com\n\nWed, 22 Jan 2025 01:08:17", "creation_timestamp": "2025-01-21T21:03:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4ba764c8-0614-4c88-b13f-996045c6731b/export"/>
    <published>2025-01-21T21:03:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d71d61a0-7568-486d-8546-f234c0f40e30/export</id>
    <title>d71d61a0-7568-486d-8546-f234c0f40e30</title>
    <updated>2026-05-10T22:00:27.178368+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d71d61a0-7568-486d-8546-f234c0f40e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/1395", "content": "PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887) \u2013 gbhackers.com\n\nWed, 22 Jan 2025 01:08:17", "creation_timestamp": "2025-01-21T21:03:23.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d71d61a0-7568-486d-8546-f234c0f40e30/export"/>
    <published>2025-01-21T21:03:23+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/16b34ff0-0def-43d2-a24b-b68245412fd2/export</id>
    <title>16b34ff0-0def-43d2-a24b-b68245412fd2</title>
    <updated>2026-05-10T22:00:27.178245+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "16b34ff0-0def-43d2-a24b-b68245412fd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/seifreed.bsky.social/post/3lgbr5hxpja2y", "content": "", "creation_timestamp": "2025-01-21T21:08:23.733767Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/16b34ff0-0def-43d2-a24b-b68245412fd2/export"/>
    <published>2025-01-21T21:08:23.733767+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4d4cd93-d298-44bd-94df-f91bf9a1ab76/export</id>
    <title>d4d4cd93-d298-44bd-94df-f91bf9a1ab76</title>
    <updated>2026-05-10T22:00:27.178099+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4d4cd93-d298-44bd-94df-f91bf9a1ab76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/neroqc.bsky.social/post/3lgbsz3sfwc2h", "content": "", "creation_timestamp": "2025-01-21T21:41:46.004274Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4d4cd93-d298-44bd-94df-f91bf9a1ab76/export"/>
    <published>2025-01-21T21:41:46.004274+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3839fd7e-88f6-4729-939a-227a417ce7bc/export</id>
    <title>3839fd7e-88f6-4729-939a-227a417ce7bc</title>
    <updated>2026-05-10T22:00:27.177953+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3839fd7e-88f6-4729-939a-227a417ce7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-54887", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgcrzilpzk2y", "content": "", "creation_timestamp": "2025-01-22T06:56:42.396016Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3839fd7e-88f6-4729-939a-227a417ce7bc/export"/>
    <published>2025-01-22T06:56:42.396016+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/75ba418d-9666-4939-867c-0996c44dafb6/export</id>
    <title>75ba418d-9666-4939-867c-0996c44dafb6</title>
    <updated>2026-05-10T22:00:27.177804+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "75ba418d-9666-4939-867c-0996c44dafb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lgcza7abe6i2", "content": "", "creation_timestamp": "2025-01-22T09:13:02.321207Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/75ba418d-9666-4939-867c-0996c44dafb6/export"/>
    <published>2025-01-22T09:13:02.321207+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1175d418-b752-453b-9185-42c564960822/export</id>
    <title>1175d418-b752-453b-9185-42c564960822</title>
    <updated>2026-05-10T22:00:27.177590+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1175d418-b752-453b-9185-42c564960822", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11717", "content": "#exploit\n1. CVE-2024-54887:\nTP-Link TL-WR940N BoF\n\n2. CVE-2024-41570:\nAuthenticated Havoc-Chained-RCE\n\n3. CVE-2025-21298:\nWindows OLE RCE (CVSS 9.8)", "creation_timestamp": "2025-01-22T17:35:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1175d418-b752-453b-9185-42c564960822/export"/>
    <published>2025-01-22T17:35:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/46b4ba0e-4063-40ef-a730-41169f737f61/export</id>
    <title>46b4ba0e-4063-40ef-a730-41169f737f61</title>
    <updated>2026-05-10T22:00:27.174395+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "46b4ba0e-4063-40ef-a730-41169f737f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54887", "type": "seen", "source": "https://t.me/LearnExploit/7519", "content": "#exploit\n1. CVE-2024-54887:\nTP-Link TL-WR940N BoF\n\n2. CVE-2024-41570:\nAuthenticated Havoc-Chained-RCE\n\n3. CVE-2025-21298:\nWindows OLE RCE (CVSS 9.8)\n\n\nIR0Day.Today Bax \n@LearnExploit", "creation_timestamp": "2025-01-25T12:35:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/46b4ba0e-4063-40ef-a730-41169f737f61/export"/>
    <published>2025-01-25T12:35:33+00:00</published>
  </entry>
</feed>
