<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 00:10:16 +0000</lastBuildDate>
    <item>
      <title>446e83fc-c7f2-474c-af7f-b6be53b4f9e7</title>
      <link>https://vulnerability.circl.lu/sighting/446e83fc-c7f2-474c-af7f-b6be53b4f9e7/export</link>
      <description>{"uuid": "446e83fc-c7f2-474c-af7f-b6be53b4f9e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7548", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkrbon466a2k", "content": "CVE-2026-7548 - Totolink NR1800X cstecgi.cgi sub_41A68C command injection\nCVE ID : CVE-2026-7548\n \n Published : May 1, 2026, 3:16 a.m. | 1\u00a0hour, 2\u00a0minutes ago\n \n Description : A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub...", "creation_timestamp": "2026-05-01T04:21:14.328589Z"}</description>
      <content:encoded>{"uuid": "446e83fc-c7f2-474c-af7f-b6be53b4f9e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7548", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkrbon466a2k", "content": "CVE-2026-7548 - Totolink NR1800X cstecgi.cgi sub_41A68C command injection\nCVE ID : CVE-2026-7548\n \n Published : May 1, 2026, 3:16 a.m. | 1\u00a0hour, 2\u00a0minutes ago\n \n Description : A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub...", "creation_timestamp": "2026-05-01T04:21:14.328589Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/446e83fc-c7f2-474c-af7f-b6be53b4f9e7/export</guid>
      <pubDate>Fri, 01 May 2026 04:21:14 +0000</pubDate>
    </item>
    <item>
      <title>66b7f2f8-36de-472a-8205-8ed28c885bf2</title>
      <link>https://vulnerability.circl.lu/sighting/66b7f2f8-36de-472a-8205-8ed28c885bf2/export</link>
      <description>{"uuid": "66b7f2f8-36de-472a-8205-8ed28c885bf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7548", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkrht2migd2f", "content": "Totolink NR1800X 9.1.0u.6279_B20210910\u3067\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u304c\u767a\u898b\u3002\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u306e\u653b\u6483\u3067\u60aa\u7528\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-7548 CVSS 8.8 | HIGH", "creation_timestamp": "2026-05-01T06:11:03.464474Z"}</description>
      <content:encoded>{"uuid": "66b7f2f8-36de-472a-8205-8ed28c885bf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-7548", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkrht2migd2f", "content": "Totolink NR1800X 9.1.0u.6279_B20210910\u3067\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u304c\u767a\u898b\u3002\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u306e\u653b\u6483\u3067\u60aa\u7528\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-7548 CVSS 8.8 | HIGH", "creation_timestamp": "2026-05-01T06:11:03.464474Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/66b7f2f8-36de-472a-8205-8ed28c885bf2/export</guid>
      <pubDate>Fri, 01 May 2026 06:11:03 +0000</pubDate>
    </item>
    <item>
      <title>88978c73-d8ca-4951-82cd-81b9bf492009</title>
      <link>https://vulnerability.circl.lu/sighting/88978c73-d8ca-4951-82cd-81b9bf492009/export</link>
      <description>{"uuid": "88978c73-d8ca-4951-82cd-81b9bf492009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7548", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkrmb3s3m626", "content": "Totolink NR1800X (9.1.0u.6279_B20210910) hit by HIGH-severity remote command injection (CVE-2026-7548). Exploit code is public! Disable remote management &amp;amp; restrict access until a patch arrives. https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c #OffSeq #i...", "creation_timestamp": "2026-05-01T07:30:29.569437Z"}</description>
      <content:encoded>{"uuid": "88978c73-d8ca-4951-82cd-81b9bf492009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7548", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkrmb3s3m626", "content": "Totolink NR1800X (9.1.0u.6279_B20210910) hit by HIGH-severity remote command injection (CVE-2026-7548). Exploit code is public! Disable remote management &amp;amp; restrict access until a patch arrives. https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c #OffSeq #i...", "creation_timestamp": "2026-05-01T07:30:29.569437Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/88978c73-d8ca-4951-82cd-81b9bf492009/export</guid>
      <pubDate>Fri, 01 May 2026 07:30:29 +0000</pubDate>
    </item>
    <item>
      <title>62c2a035-0e55-44a0-b925-5553ef63e5eb</title>
      <link>https://vulnerability.circl.lu/sighting/62c2a035-0e55-44a0-b925-5553ef63e5eb/export</link>
      <description>{"uuid": "62c2a035-0e55-44a0-b925-5553ef63e5eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7548", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116498145415987925", "content": "\ud83d\udd25 HIGH severity: CVE-2026-7548 hits Totolink NR1800X (9.1.0u.6279_B20210910) \u2014 remote command injection via setUssd in /cgi-bin/cstecgi.cgi. Exploit is public, no patch yet. Disable remote management ASAP! https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c #OffSeq #infosec #vuln #IoT", "creation_timestamp": "2026-05-01T07:30:49.758076Z"}</description>
      <content:encoded>{"uuid": "62c2a035-0e55-44a0-b925-5553ef63e5eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-7548", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116498145415987925", "content": "\ud83d\udd25 HIGH severity: CVE-2026-7548 hits Totolink NR1800X (9.1.0u.6279_B20210910) \u2014 remote command injection via setUssd in /cgi-bin/cstecgi.cgi. Exploit is public, no patch yet. Disable remote management ASAP! https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c #OffSeq #infosec #vuln #IoT", "creation_timestamp": "2026-05-01T07:30:49.758076Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/62c2a035-0e55-44a0-b925-5553ef63e5eb/export</guid>
      <pubDate>Fri, 01 May 2026 07:30:49 +0000</pubDate>
    </item>
  </channel>
</rss>
