{"vulnerability": "cve-2023-52039", "sightings": [{"uuid": "96627991-840e-411f-b998-ed0b59a0b51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/ctinow/187181", "content": "https://ift.tt/37A4e0p\nCVE-2023-52039 | Totolink X6000R 9.4.0cu.852_B20230719 sub_415AA4 command injection", "creation_timestamp": "2024-02-18T09:11:52.000000Z"}, {"uuid": "6c2ab67b-894c-43b5-82c9-81efc5da21ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/arpsyndicate/2998", "content": "#ExploitObserverAlert\n\nCVE-2023-52039\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52039. An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415AA4 function.", "creation_timestamp": "2024-01-26T16:08:58.000000Z"}, {"uuid": "7a42b09a-bc7e-40a2-b59d-952e7768e4b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/ctinow/176338", "content": "https://ift.tt/Hp4cvoq\nCVE-2023-52039 Exploit", "creation_timestamp": "2024-01-30T23:16:44.000000Z"}, {"uuid": "3855d0d9-3d86-426b-a343-db653c60ea49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52039", "type": "seen", "source": "https://t.me/ctinow/173025", "content": "https://ift.tt/aBzwKPf\nCVE-2023-52039", "creation_timestamp": "2024-01-24T19:26:54.000000Z"}]}