CryptoWire Analysis

IOB - Indicator of Behavior (19)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

zh12
en8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn20

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

OPNsense4
TOTOLINK A800R2
TOTOLINK A810R2
TOTOLINK A830R2
TOTOLINK A950RG2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1OPNsense Access Control access control6.46.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000510.00CVE-2018-18958
2Apple macOS Kernel state issue5.45.3$0-$5k$0-$5kHighOfficial Fix0.003400.00CVE-2023-38606
3Shenzhen Youkate Industrial Facial Love Cloud Payment System Account SystemMng.ashx privileges management8.17.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000630.04CVE-2023-6099
4EmpireCMS AdClass.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.001720.04CVE-2022-28585
5Apache HTTP Server HTTP/2 Request request smuggling6.46.4$5k-$25k$5k-$25kNot DefinedNot Defined0.006060.00CVE-2020-9490
6Qualcomm Snapdragon Auto SIP sigcomp Message memory corruption7.67.6$5k-$25k$5k-$25kNot DefinedOfficial Fix0.001880.00CVE-2020-3639
7OPNsense Login Page redirect5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.001790.01CVE-2020-23015
8TOTOLINK A800R/A810R/A830R/A950RG/A3000RU/A3100R setWebWlanIdx command injection5.55.3$0-$5k$0-$5kNot DefinedNot Defined0.017020.00CVE-2022-26208
9Cisco RV340/RV345 Web-based Management Interface stack-based overflow4.74.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.002110.00CVE-2022-20753
10Wowza Streaming Engine Password File admin.password cleartext storage3.33.3$0-$5k$0-$5kNot DefinedNot Defined0.000420.00CVE-2021-31539
11Cisco IOS/IOS XE DHCP Relay input validation9.89.7$25k-$100k$5k-$25kHighOfficial Fix0.051780.05CVE-2017-12240
12Freeware Advanced Audio Coder huff2.c huffcode memory corruption4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000510.00CVE-2018-19890
13Open Whisper Signal cross site scripting5.25.2$5k-$25k$5k-$25kNot DefinedNot Defined0.001860.00CVE-2018-11101
14phpBB Admin Control Panel file_exists input validation5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.771890.00CVE-2018-19274
15phpBB information disclosure9.88.5$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.002690.00CVE-2008-1766
16Microsoft Exchange Server Privilege Escalation8.87.7$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.012580.00CVE-2021-28482
17Discuz! admin.php cross site scripting3.63.6$0-$5k$0-$5kNot DefinedNot Defined0.000540.06CVE-2018-19464
18Pulse Secure Pulse Connect Secure End User Portal custompage.cgi cross site scripting3.63.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000540.00CVE-2017-17947

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1194.156.98.51vm1867589.stark-industries.solutionsCryptoWire03/19/2024verifiedHigh

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (12)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/SystemMng.ashxpredictiveHigh
2FileAdClass.phppredictiveMedium
3Filexxxxx.xxxpredictiveMedium
4Filexxxx/xxxxx.xxxxxxxxpredictiveHigh
5Filexxxxxxxxxx.xxxpredictiveHigh
6Filexxxxxxx/xxxxx.xpredictiveHigh
7ArgumentxxxxxxxxxxxxpredictiveMedium
8Argumentxxxxxx/xxxxxx/xxxpredictiveHigh
9ArgumentxxxxxxxxpredictiveMedium
10ArgumentxxxpredictiveLow
11ArgumentxxxxxxxxxxpredictiveMedium
12Input ValuexxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!