<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 05:07:33 +0000</lastBuildDate>
    <item>
      <title>024ccd6d-8a1d-45ca-b269-c717bcecba90</title>
      <link>https://vulnerability.circl.lu/sighting/024ccd6d-8a1d-45ca-b269-c717bcecba90/export</link>
      <description>{"uuid": "024ccd6d-8a1d-45ca-b269-c717bcecba90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3298", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:19:44.000000Z"}</description>
      <content:encoded>{"uuid": "024ccd6d-8a1d-45ca-b269-c717bcecba90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3298", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:19:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/024ccd6d-8a1d-45ca-b269-c717bcecba90/export</guid>
      <pubDate>Fri, 11 Nov 2022 05:19:44 +0000</pubDate>
    </item>
    <item>
      <title>ddeec860-ebff-4aec-9bf7-c71773d02963</title>
      <link>https://vulnerability.circl.lu/sighting/ddeec860-ebff-4aec-9bf7-c71773d02963/export</link>
      <description>{"uuid": "ddeec860-ebff-4aec-9bf7-c71773d02963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3299", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:28:48.000000Z"}</description>
      <content:encoded>{"uuid": "ddeec860-ebff-4aec-9bf7-c71773d02963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3299", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:28:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ddeec860-ebff-4aec-9bf7-c71773d02963/export</guid>
      <pubDate>Fri, 11 Nov 2022 05:28:48 +0000</pubDate>
    </item>
    <item>
      <title>dba661e3-891c-483d-9723-1f297e377097</title>
      <link>https://vulnerability.circl.lu/sighting/dba661e3-891c-483d-9723-1f297e377097/export</link>
      <description>{"uuid": "dba661e3-891c-483d-9723-1f297e377097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3300", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:37:58.000000Z"}</description>
      <content:encoded>{"uuid": "dba661e3-891c-483d-9723-1f297e377097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3300", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-11T05:37:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dba661e3-891c-483d-9723-1f297e377097/export</guid>
      <pubDate>Fri, 11 Nov 2022 05:37:58 +0000</pubDate>
    </item>
    <item>
      <title>4cb35dc3-b3cb-493d-8c58-9deb98068939</title>
      <link>https://vulnerability.circl.lu/sighting/4cb35dc3-b3cb-493d-8c58-9deb98068939/export</link>
      <description>{"uuid": "4cb35dc3-b3cb-493d-8c58-9deb98068939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3441", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-17T13:07:20.000000Z"}</description>
      <content:encoded>{"uuid": "4cb35dc3-b3cb-493d-8c58-9deb98068939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3441", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\nURL\uff1ahttps://github.com/gigaryte/cve-2022-31898\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-17T13:07:20.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4cb35dc3-b3cb-493d-8c58-9deb98068939/export</guid>
      <pubDate>Thu, 17 Nov 2022 13:07:20 +0000</pubDate>
    </item>
    <item>
      <title>47dee084-bc6d-4778-a274-0a502ce370a9</title>
      <link>https://vulnerability.circl.lu/sighting/47dee084-bc6d-4778-a274-0a502ce370a9/export</link>
      <description>{"uuid": "47dee084-bc6d-4778-a274-0a502ce370a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1407", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]", "creation_timestamp": "2022-11-19T07:58:56.000000Z"}</description>
      <content:encoded>{"uuid": "47dee084-bc6d-4778-a274-0a502ce370a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1407", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]", "creation_timestamp": "2022-11-19T07:58:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47dee084-bc6d-4778-a274-0a502ce370a9/export</guid>
      <pubDate>Sat, 19 Nov 2022 07:58:56 +0000</pubDate>
    </item>
    <item>
      <title>265b81c2-046b-437a-a944-536da90187a4</title>
      <link>https://vulnerability.circl.lu/sighting/265b81c2-046b-437a-a944-536da90187a4/export</link>
      <description>{"uuid": "265b81c2-046b-437a-a944-536da90187a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2472", "content": "#CVE-2022\nExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nhttps://github.com/gigaryte/cve-2022-31898\n\n@BlueRedTeam", "creation_timestamp": "2022-11-19T20:51:11.000000Z"}</description>
      <content:encoded>{"uuid": "265b81c2-046b-437a-a944-536da90187a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2472", "content": "#CVE-2022\nExploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nhttps://github.com/gigaryte/cve-2022-31898\n\n@BlueRedTeam", "creation_timestamp": "2022-11-19T20:51:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/265b81c2-046b-437a-a944-536da90187a4/export</guid>
      <pubDate>Sat, 19 Nov 2022 20:51:11 +0000</pubDate>
    </item>
    <item>
      <title>f9e91b18-6dbb-4915-b1b4-810bfad44449</title>
      <link>https://vulnerability.circl.lu/sighting/f9e91b18-6dbb-4915-b1b4-810bfad44449/export</link>
      <description>{"uuid": "f9e91b18-6dbb-4915-b1b4-810bfad44449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/professional_c_h/1858", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]\n\nChannel:\n@Professional_c_h\n@card_crack_hack", "creation_timestamp": "2022-12-02T11:06:09.000000Z"}</description>
      <content:encoded>{"uuid": "f9e91b18-6dbb-4915-b1b4-810bfad44449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/professional_c_h/1858", "content": "\ud83d\udd25Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215\n\nUsage:\ncve-2022-31898.py [-h] -R RHOST [-P RPORT] -L LHOST [-l LPORT] [-p PWD] [-t]\n\nChannel:\n@Professional_c_h\n@card_crack_hack", "creation_timestamp": "2022-12-02T11:06:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f9e91b18-6dbb-4915-b1b4-810bfad44449/export</guid>
      <pubDate>Fri, 02 Dec 2022 11:06:09 +0000</pubDate>
    </item>
    <item>
      <title>9a315cc0-c630-48a3-959b-9ff0be3bc753</title>
      <link>https://vulnerability.circl.lu/sighting/9a315cc0-c630-48a3-959b-9ff0be3bc753/export</link>
      <description>{"uuid": "9a315cc0-c630-48a3-959b-9ff0be3bc753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7155", "content": "#exploit\n1. CVE-2022-41352:\nZimbra &amp;lt;9.0.0.p27 - Unauthenticated RCE\nhttps://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce\n\n2. CVE-2022-3949:\nXSS in Simple Cashiering System\nhttps://github.com/maikroservice/CVE-2022-3949\n\n3. CVE-2022-31898:\nCommand injection for GL-iNet routers with firm. &amp;lt;3.215\nhttps://github.com/gigaryte/cve-2022-31898", "creation_timestamp": "2022-12-21T05:02:22.000000Z"}</description>
      <content:encoded>{"uuid": "9a315cc0-c630-48a3-959b-9ff0be3bc753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7155", "content": "#exploit\n1. CVE-2022-41352:\nZimbra &amp;lt;9.0.0.p27 - Unauthenticated RCE\nhttps://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce\n\n2. CVE-2022-3949:\nXSS in Simple Cashiering System\nhttps://github.com/maikroservice/CVE-2022-3949\n\n3. CVE-2022-31898:\nCommand injection for GL-iNet routers with firm. &amp;lt;3.215\nhttps://github.com/gigaryte/cve-2022-31898", "creation_timestamp": "2022-12-21T05:02:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9a315cc0-c630-48a3-959b-9ff0be3bc753/export</guid>
      <pubDate>Wed, 21 Dec 2022 05:02:22 +0000</pubDate>
    </item>
    <item>
      <title>a061c1f0-cbd3-46de-9a9f-fcaa2db44221</title>
      <link>https://vulnerability.circl.lu/sighting/a061c1f0-cbd3-46de-9a9f-fcaa2db44221/export</link>
      <description>{"uuid": "a061c1f0-cbd3-46de-9a9f-fcaa2db44221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15399", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31898\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were discovered to contain multiple command injection vulnerabilities via the ping_addr and trace_addr function parameters.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T18:27:47.420Z\n\ud83d\udd17 References:\n1. https://boschko.ca/glinet-router", "creation_timestamp": "2025-05-07T19:22:38.000000Z"}</description>
      <content:encoded>{"uuid": "a061c1f0-cbd3-46de-9a9f-fcaa2db44221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-31898", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15399", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-31898\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were discovered to contain multiple command injection vulnerabilities via the ping_addr and trace_addr function parameters.\n\ud83d\udccf Published: 2022-10-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-07T18:27:47.420Z\n\ud83d\udd17 References:\n1. https://boschko.ca/glinet-router", "creation_timestamp": "2025-05-07T19:22:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a061c1f0-cbd3-46de-9a9f-fcaa2db44221/export</guid>
      <pubDate>Wed, 07 May 2025 19:22:38 +0000</pubDate>
    </item>
  </channel>
</rss>
