{"vulnerability": "cve-2024-4455", "sightings": [{"uuid": "7da297b9-b37c-4351-9e78-5da4c3ae1628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44551", "type": "seen", "source": "https://t.me/cvedetector/4176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44551 - Tenda AX1806 Remote Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44551 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function formGetIptv. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:40.000000Z"}, {"uuid": "02c2617a-8e9a-4f19-a100-6d7a1382b99b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4455", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mbaarlfjwq2f", "content": "", "creation_timestamp": "2025-12-30T21:02:59.859514Z"}, {"uuid": "7941c1c6-b23d-49bb-bfbd-a67bbb60a072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44552", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7981", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-44552\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv.\n\ud83d\udccf Published: 2024-08-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-18T19:25:21.656Z\n\ud83d\udd17 References:\n1. https://detailed-stetson-767.notion.site/Tenda-AX1806-Buffer-Overflow-in-formGetIptv-74cd0418924247729bae905996ae8902?pvs=4", "creation_timestamp": "2025-03-18T19:48:54.000000Z"}, {"uuid": "48ab5250-0977-4ff1-b372-3e9bfed09a8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44555", "type": "seen", "source": "https://t.me/cvedetector/4172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44555 - Tenda AX1806 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-44555 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function setIptvInfo. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:34.000000Z"}, {"uuid": "0c7fb4c4-d15f-4458-b06b-8f887b07fed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44556", "type": "seen", "source": "https://t.me/cvedetector/4143", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44556 - Tenda AX1806 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-44556 \nPublished : Aug. 26, 2024, 1:15 p.m. | 45\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T16:14:08.000000Z"}, {"uuid": "0a108028-f819-485d-8b65-240aac5f56e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44550", "type": "seen", "source": "https://t.me/cvedetector/4175", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44550 - Tenda AX1806 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-44550 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formGetIptv. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:36.000000Z"}, {"uuid": "f491bb31-dcc7-4aef-bd04-5302b87dd694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44557", "type": "seen", "source": "https://t.me/cvedetector/4174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44557 - Tenda AX1806 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-44557 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:35.000000Z"}, {"uuid": "231780fc-02dc-4cbb-b2f0-f866e2fd63ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44552", "type": "seen", "source": "https://t.me/cvedetector/4173", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44552 - Tenda AX1806 Remote Code Execution Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-44552 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:34.000000Z"}, {"uuid": "8274159e-12b4-4044-a1aa-ee77334dc083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44553", "type": "seen", "source": "https://t.me/cvedetector/4170", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44553 - Tenda AX1806 Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44553 \nPublished : Aug. 26, 2024, 4:15 p.m. | 27\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formGetIptv. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T18:49:29.000000Z"}, {"uuid": "b10d54f3-e81f-4db1-9e35-f9a1f9747b31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-44558", "type": "seen", "source": "https://t.me/cvedetector/4142", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44558 - Tenda AX1806 Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-44558 \nPublished : Aug. 26, 2024, 1:15 p.m. | 45\u00a0minutes ago \nDescription : Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function setIptvInfo. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T16:14:07.000000Z"}]}