<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 13:17:59 +0000</lastBuildDate>
    <item>
      <title>ef42c0dd-b7d6-42c9-8a6c-28a34fb88d1e</title>
      <link>https://vulnerability.circl.lu/sighting/ef42c0dd-b7d6-42c9-8a6c-28a34fb88d1e/export</link>
      <description>{"uuid": "ef42c0dd-b7d6-42c9-8a6c-28a34fb88d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27542", "type": "seen", "source": "https://t.me/cibsecurity/22641", "content": "\u203c CVE-2020-27542 \u203c\n\nRostelecom CS-C2SHW 5.0.082.1 is affected by: Bash command injection. The camera reads configuration from QR code (including network settings). The static IP configuration from QR code is copied to the file /config/ip-static and after reboot data from this file is inserted into bash command (without any escaping). So bash injection is possible. Camera doesn't parse QR codes if it's already successfully configured. Camera is always rebooted after successful configuration via QR code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-26T20:46:38.000000Z"}</description>
      <content:encoded>{"uuid": "ef42c0dd-b7d6-42c9-8a6c-28a34fb88d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27542", "type": "seen", "source": "https://t.me/cibsecurity/22641", "content": "\u203c CVE-2020-27542 \u203c\n\nRostelecom CS-C2SHW 5.0.082.1 is affected by: Bash command injection. The camera reads configuration from QR code (including network settings). The static IP configuration from QR code is copied to the file /config/ip-static and after reboot data from this file is inserted into bash command (without any escaping). So bash injection is possible. Camera doesn't parse QR codes if it's already successfully configured. Camera is always rebooted after successful configuration via QR code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-26T20:46:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ef42c0dd-b7d6-42c9-8a6c-28a34fb88d1e/export</guid>
      <pubDate>Tue, 26 Jan 2021 20:46:38 +0000</pubDate>
    </item>
  </channel>
</rss>
