{"vulnerability": "cve-2024-41570", "sightings": [{"uuid": "2aa3ca73-ad56-48df-9077-c2591400565c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://gist.github.com/pich4ya/bda16a3b2104bea411612f20d536174b", "content": "", "creation_timestamp": "2025-01-19T11:29:07.000000Z"}, {"uuid": "40b3ef5d-c53b-4cbd-8064-9212c07ec013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://gist.github.com/averageguy011/b70be19d14812a62f7cfc3101eea3270", "content": "", "creation_timestamp": "2025-01-19T15:22:11.000000Z"}, {"uuid": "eba27146-1849-431c-b219-80ac28ad10c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://gist.github.com/Sorrashut-K/ca42cd046b9c348d2feffc98deac6da5", "content": "", "creation_timestamp": "2025-01-19T15:27:22.000000Z"}, {"uuid": "5aa07110-545b-43a0-a0a6-e39e08c2a2a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://bsky.app/profile/z3r082.bsky.social/post/3lgayodhgw22t", "content": "", "creation_timestamp": "2025-01-21T13:50:21.933189Z"}, {"uuid": "57526f42-c348-4aa1-a9d1-eda4698ea86d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8191", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit\nURL\uff1ahttps://github.com/chebuya/Havoc-C2-SSRF-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-07T20:26:06.000000Z"}, {"uuid": "36e358b7-ed08-4fd6-becd-5edbd5c7835d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/11161", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aThis is a Chained RCE in the Havoc C2 framework using github.com/chebuya and github.com/IncludeSecurity pocs\nURL\uff1ahttps://github.com/thisisveryfunny/CVE-2024-41570-Havoc-C2-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-01-22T13:51:08.000000Z"}, {"uuid": "88b6f16b-8928-44ee-8ef0-440702b47a3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/11040", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aAutomated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE\nURL\uff1ahttps://github.com/kit4py/CVE-2024-41570\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-01-21T09:46:08.000000Z"}, {"uuid": "e1a36781-9135-4198-8aa7-21117d5109fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://t.me/purple_medved/297", "content": "\u0412 \u0441\u0432\u043e\u0435\u043c \u0434\u043e\u043a\u043b\u0430\u0434\u0435 \u043d\u0430 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c \u044d\u0442\u043e\u0439 \u0432\u0435\u0441\u043d\u043e\u0439 \u043a\u0438\u0431\u0435\u0440\u0444\u0435\u0441\u0442\u0438\u0432\u0430\u043b\u0435 Positive Hack Days Fest 2 \u044f \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u043b \u043e \u0442\u043e\u043c, \u043f\u043e\u0447\u0435\u043c\u0443 \u0432\u0430\u0436\u043d\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0442\u044c \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u0412 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u043b \u043e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0443\u0437\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u04212 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430\u0445 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c.\n\n\u0412 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0435\u043d\u0438\u0438 \u044d\u0442\u043e\u0439 \u0442\u0435\u043c\u044b, \u043c\u043d\u0435 \u043d\u0430 \u0433\u043b\u0430\u0437\u0430 \u043f\u043e\u043f\u0430\u043b\u0430\u0441\u044c \u0441\u0442\u0430\u0442\u044c\u044f - Vulnerabilities in Open Source C2 Frameworks, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0432\u0442\u043e\u0440 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043b \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 \u0431\u0430\u0433\u0438 \u0434\u043b\u044f \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0438 \u043d\u0435 \u043e\u0447\u0435\u043d\u044c \u04212 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u043e\u0432:\n\n\ud83d\udd34 Sliver\n\u041a\u043e\u0433\u0434\u0430-\u0442\u043e \u0434\u0430\u0432\u043d\u043e \u0431\u044b\u043b \u043c\u043e\u0438\u043c \u0444\u0430\u0432\u043e\u0440\u0438\u0442\u043e\u043c, \u0430 \u0442\u0435\u043f\u0435\u0440\u044c \u0442\u0430\u043c \u043d\u0430\u0448\u043b\u0438 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u0440\u0438\u043a\u043e\u043b\u044c\u043d\u0443\u044e \u0431\u0430\u0433\u0443 CVE-2024-41111 - RCE on the teamserver by a low-privileged operator, \u043f\u043e \u0441\u0443\u0442\u0438 command injection \u0432 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f msfvenom, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 Sliver \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0434\u043b\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 msf stagers.\n\ud83d\udd34 Havoc\n\u041d\u0430\u0431\u0438\u0440\u0430\u044e\u0449\u0438\u0439 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u043d\u0430 Go c 3 \u0431\u0430\u0433\u0430\u043c\u0438: CVE-2024-41570 - Unauthenticated SSRF, Authenticated Command Injection, Service API Authentication Bypass (\u0434\u0435\u0442\u0430\u043b\u0438 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435).\n\ud83d\udd34 Ninja \u04212, \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u043b\u0438\u043a\u043d\u0443\u0442\u044b\u0445 \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0439 APT Muddywater, \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0441\u044f RCE \u0447\u0435\u0440\u0435\u0437 Unauthenticated Arbitrary File Download via path traversal \u0432\u0435\u0431 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430. \n\ud83d\udd34 SHAD0W\nUnauthenticated RCE - \u0435\u0449\u0435 \u043e\u0434\u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0430\u044f \u0431\u0430\u0433\u0430, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e Situational awareness \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u0431 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u0435, \u0434\u043e\u043c\u0435\u043d\u0435, \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0435\u043c\u044b\u0435 \u043f\u0440\u0438 \u043e\u0442\u0441\u0442\u0443\u043a\u0435 beacon'a \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 \u0434\u043b\u044f \u043a\u043e\u043c\u043f\u0438\u043b\u044f\u0446\u0438\u0438 \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u043f\u043e\u0441\u0442-\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\ud83d\udd34 Covenant, \u043a\u043e\u0433\u0434\u0430-\u0442\u043e \u0442\u043e\u0436\u0435 \u0431\u044b\u043b \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u043c\u043e\u0438\u0445 \u0444\u0430\u0432\u043e\u0440\u0438\u0442\u043e\u0432, \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d Authenticated Command Injection \u0438 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0447\u0435\u0440\u0435\u0437 UI (\u0434\u0435\u0442\u0430\u043b\u0438 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435).\n\n\u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0432\u0441\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u043d\u044b\u0435 \u04212 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0438, \u0437\u0430 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c Mythic (\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0443\u0436\u0435 \u043d\u0435\u043e\u0434\u043d\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u043f\u0438\u0441\u0430\u043b \u0440\u0430\u043d\u0435\u0435) \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u0443\u0437\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0442\u0430\u0432\u044f\u0442 \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u0443 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0438 \u043a\u0430\u043a \u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0430\u043d\u043d\u044b\u043c \u0438 \u0438\u043d\u0444\u0440\u0435 \u0442\u0435\u0441\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438.", "creation_timestamp": "2024-10-02T07:56:42.000000Z"}, {"uuid": "1b5fe434-b1d7-4e2e-9fe4-e3286294eaa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/10935", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aThis POC chains CVE-2024-41570 and RCE in Havoc C2\nURL\uff1ahttps://github.com/Doc-Grinch/Havoc-CVE-2024-41570-and-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-01-20T09:29:18.000000Z"}, {"uuid": "3364c06e-1bd1-4021-b336-b4ff3eb96925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://t.me/LearnExploit/7519", "content": "#exploit\n1. CVE-2024-54887:\nTP-Link TL-WR940N BoF\n\n2. CVE-2024-41570:\nAuthenticated Havoc-Chained-RCE\n\n3. CVE-2025-21298:\nWindows OLE RCE (CVSS 9.8)\n\n\nIR0Day.Today Bax \n@LearnExploit", "creation_timestamp": "2025-01-25T12:35:33.000000Z"}, {"uuid": "15a32a05-3ac1-4e21-8b3f-cdba2d08dd89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "Telegram/5lwIiVRlGValAb7a3y7unGCeHw0VejzNjVdua0u49Ev9FgE", "content": "", "creation_timestamp": "2025-01-20T16:00:09.000000Z"}, {"uuid": "6b7f71e1-5fac-40b0-97ec-db3926b9f4b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "Telegram/WihYjZpKNIYylc-ChTuYB_T11QPQd1rZGQXBp3o0NaE4LfU", "content": "", "creation_timestamp": "2025-01-24T22:00:05.000000Z"}, {"uuid": "df8b4727-0dd2-436c-8dac-2afbe0683de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "Telegram/iHBlR7HiQYAKo3u9PWvhUCFNHGmyaN8ahtUaNZl3AgV9dFg", "content": "", "creation_timestamp": "2025-01-21T16:00:09.000000Z"}, {"uuid": "988ac563-23e4-478c-943a-f8b8d8bc1cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "published-proof-of-concept", "source": "Telegram/3pS_Pvw2OfO7rZyKSGbZwVjgLvux4UegxqsdJCPogYrk_14", "content": "", "creation_timestamp": "2025-01-21T10:00:06.000000Z"}, {"uuid": "47b5618c-f59e-4701-9ab5-b2fe77b9ff14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41570", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11717", "content": "#exploit\n1. CVE-2024-54887:\nTP-Link TL-WR940N BoF\n\n2. CVE-2024-41570:\nAuthenticated Havoc-Chained-RCE\n\n3. CVE-2025-21298:\nWindows OLE RCE (CVSS 9.8)", "creation_timestamp": "2025-01-22T17:35:10.000000Z"}]}