<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 00:10:16 +0000</lastBuildDate>
    <item>
      <title>e3707e8f-dcb6-4508-b171-ff30c44f38b9</title>
      <link>https://vulnerability.circl.lu/sighting/e3707e8f-dcb6-4508-b171-ff30c44f38b9/export</link>
      <description>{"uuid": "e3707e8f-dcb6-4508-b171-ff30c44f38b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7546", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkrbxm6sjl2k", "content": "CVE-2026-7546 - Totolink NR1800X lighttpd find_host_ip stack-based overflow\nCVE ID : CVE-2026-7546\n \n Published : May 1, 2026, 3:16 a.m. | 1\u00a0hour, 2\u00a0minutes ago\n \n Description : A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B20210910. The impacted ...", "creation_timestamp": "2026-05-01T04:26:13.468769Z"}</description>
      <content:encoded>{"uuid": "e3707e8f-dcb6-4508-b171-ff30c44f38b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7546", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkrbxm6sjl2k", "content": "CVE-2026-7546 - Totolink NR1800X lighttpd find_host_ip stack-based overflow\nCVE ID : CVE-2026-7546\n \n Published : May 1, 2026, 3:16 a.m. | 1\u00a0hour, 2\u00a0minutes ago\n \n Description : A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B20210910. The impacted ...", "creation_timestamp": "2026-05-01T04:26:13.468769Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e3707e8f-dcb6-4508-b171-ff30c44f38b9/export</guid>
      <pubDate>Fri, 01 May 2026 04:26:13 +0000</pubDate>
    </item>
    <item>
      <title>1dce1808-7f03-45c8-a6ae-33d36d48822d</title>
      <link>https://vulnerability.circl.lu/sighting/1dce1808-7f03-45c8-a6ae-33d36d48822d/export</link>
      <description>{"uuid": "1dce1808-7f03-45c8-a6ae-33d36d48822d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7546", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116497437579436842", "content": "\ud83d\udea8 CRITICAL: CVE-2026-7546 in Totolink NR1800X (v9.1.0u.6279_B20210910) \u2014 stack buffer overflow in lighttpd. Remote code execution possible. No patch yet. Limit device exposure &amp;amp; monitor vendor updates. https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc #OffSeq #CVE #IoTSecurity #infosec", "creation_timestamp": "2026-05-01T04:30:27.461046Z"}</description>
      <content:encoded>{"uuid": "1dce1808-7f03-45c8-a6ae-33d36d48822d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7546", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116497437579436842", "content": "\ud83d\udea8 CRITICAL: CVE-2026-7546 in Totolink NR1800X (v9.1.0u.6279_B20210910) \u2014 stack buffer overflow in lighttpd. Remote code execution possible. No patch yet. Limit device exposure &amp;amp; monitor vendor updates. https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc #OffSeq #CVE #IoTSecurity #infosec", "creation_timestamp": "2026-05-01T04:30:27.461046Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1dce1808-7f03-45c8-a6ae-33d36d48822d/export</guid>
      <pubDate>Fri, 01 May 2026 04:30:27 +0000</pubDate>
    </item>
    <item>
      <title>4cd2cb6d-2bb1-4766-9606-0ef0a2bd826e</title>
      <link>https://vulnerability.circl.lu/sighting/4cd2cb6d-2bb1-4766-9606-0ef0a2bd826e/export</link>
      <description>{"uuid": "4cd2cb6d-2bb1-4766-9606-0ef0a2bd826e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7546", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkrc77erfh2v", "content": "Totolink NR1800X routers face CRITICAL risk: CVE-2026-7546 (stack buffer overflow in lighttpd, v9.1.0u.6279_B20210910). No patch yet \u2014 restrict access &amp;amp; monitor updates. https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc #OffSeq #CVE #IoTSecurity", "creation_timestamp": "2026-05-01T04:30:29.448190Z"}</description>
      <content:encoded>{"uuid": "4cd2cb6d-2bb1-4766-9606-0ef0a2bd826e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7546", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkrc77erfh2v", "content": "Totolink NR1800X routers face CRITICAL risk: CVE-2026-7546 (stack buffer overflow in lighttpd, v9.1.0u.6279_B20210910). No patch yet \u2014 restrict access &amp;amp; monitor updates. https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc #OffSeq #CVE #IoTSecurity", "creation_timestamp": "2026-05-01T04:30:29.448190Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4cd2cb6d-2bb1-4766-9606-0ef0a2bd826e/export</guid>
      <pubDate>Fri, 01 May 2026 04:30:29 +0000</pubDate>
    </item>
    <item>
      <title>95fba03c-e26c-4bf7-a1b2-8ee343a9baf7</title>
      <link>https://vulnerability.circl.lu/sighting/95fba03c-e26c-4bf7-a1b2-8ee343a9baf7/export</link>
      <description>{"uuid": "95fba03c-e26c-4bf7-a1b2-8ee343a9baf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7546", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkrhr4lqth2c", "content": "Totolink NR1800X 9.1.0u.6279_B20210910\u306elighttpd\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3067\u3001Host\u5f15\u6570\u64cd\u4f5c\u306b\u3088\u308a\u30b9\u30bf\u30c3\u30af\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u304c\u767a\u751f\u3002\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u306e\u653b\u6483\u304c\u53ef\u80fd\u3002\nCVE-2026-7546 CVSS 9.8 | CRITICAL", "creation_timestamp": "2026-05-01T06:09:58.299216Z"}</description>
      <content:encoded>{"uuid": "95fba03c-e26c-4bf7-a1b2-8ee343a9baf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7546", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkrhr4lqth2c", "content": "Totolink NR1800X 9.1.0u.6279_B20210910\u306elighttpd\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u3067\u3001Host\u5f15\u6570\u64cd\u4f5c\u306b\u3088\u308a\u30b9\u30bf\u30c3\u30af\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u304c\u767a\u751f\u3002\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u306e\u653b\u6483\u304c\u53ef\u80fd\u3002\nCVE-2026-7546 CVSS 9.8 | CRITICAL", "creation_timestamp": "2026-05-01T06:09:58.299216Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/95fba03c-e26c-4bf7-a1b2-8ee343a9baf7/export</guid>
      <pubDate>Fri, 01 May 2026 06:09:58 +0000</pubDate>
    </item>
  </channel>
</rss>
