{"vulnerability": "CVE-2024-54007", "sightings": [{"uuid": "8a77b3b7-5641-457f-ace6-398b401caa19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfbqiu7pnk2q", "content": "", "creation_timestamp": "2025-01-09T03:31:42.303110Z"}, {"uuid": "12054900-014d-4ab0-a93f-2c93eaaacc09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfetd5iyec22", "content": "", "creation_timestamp": "2025-01-10T09:00:08.547820Z"}, {"uuid": "47c8a639-d527-4b0f-8a42-76506c2873d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfcfhenul72q", "content": "", "creation_timestamp": "2025-01-09T09:46:37.899751Z"}, {"uuid": "adc83782-0898-4db5-8bd5-5d3d7e436a71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://bsky.app/profile/spritzfinance.bsky.social/post/3lfd4rqzkhk2z", "content": "", "creation_timestamp": "2025-01-09T16:44:01.843784Z"}, {"uuid": "10861f1a-0b9f-4f61-a5b3-4770b0c325f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf6aydxsu62o", "content": "", "creation_timestamp": "2025-01-07T18:15:59.347513Z"}, {"uuid": "cb0379f0-56cb-45eb-bfe4-91725c72324f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf6creh26o2r", "content": "", "creation_timestamp": "2025-01-07T18:47:58.053356Z"}, {"uuid": "7a51d2ea-cb4f-45df-9763-3130bc6a4881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-54007", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfc3ifmmd22j", "content": "", "creation_timestamp": "2025-01-09T06:48:15.362741Z"}, {"uuid": "150fca7b-8119-4e63-8d78-e1490d8df65c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-54007", "type": "seen", "source": "https://bsky.app/profile/sambowne.infosec.exchange.ap.brid.gy/post/3lfsvj2csjit2", "content": "", "creation_timestamp": "2025-01-15T23:16:30.739388Z"}, {"uuid": "00111606-babb-4cf5-a002-497481050df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://t.me/cvedetector/14589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54007 - 501 Wireless Client Bridge Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54007 \nPublished : Jan. 7, 2025, 6:15 p.m. | 24\u00a0minutes ago \nDescription : Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T19:44:23.000000Z"}, {"uuid": "01f2d4c3-65fb-4e31-8708-1986473d8749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54007\n\ud83d\udd39 Description: Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system.\n\ud83d\udccf Published: 2025-01-07T17:17:39.607Z\n\ud83d\udccf Modified: 2025-01-07T17:17:39.607Z\n\ud83d\udd17 References:\n1. https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04763en_us&amp;docLocale=en_US", "creation_timestamp": "2025-01-07T17:40:22.000000Z"}, {"uuid": "43ef5ef6-6462-4e40-a0f9-26135697db7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54007", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/2014", "content": "\u26a1\ufe0fCVE-2024-54006 &amp; CVE-2024-54007: Command Injection Flaws in HPE Aruba Devices, PoC Publicly Available.\n\n#CyberBulletin", "creation_timestamp": "2025-01-09T05:36:08.000000Z"}]}