CNCERT:物联网安全威胁情报月报 (2019年9月)
Common Information
Type Value
UUID ca950bcb-f983-4c6e-bb88-47b2299278ef
Fingerprint fe3c3f073f9dfba2
Analysis status DONE
Considered CTI value 2
Text language
Published Oct. 23, 2019, midnight
Added to db Dec. 20, 2024, 2:45 a.m.
Last updated Dec. 25, 2024, 10:29 a.m.
Headline CNCERT:物联网安全威胁情报月报 (2019年9月)
Title CNCERT:物联网安全威胁情报月报 (2019年9月)
Detected Hints/Tags/Attributes 13/1/17
Source URLs
Attributes
Details Type #Events CTI Value
Details CVE 53
cve-2018-10561
Details CVE 51
cve-2018-10562
Details CVE 84
cve-2017-17215
Details CVE 85
cve-2014-8361
Details Domain 2
scan.rapeme.fun
Details Domain 25
www.anquanke.com
Details Domain 95
securityaffairs.co
Details Domain 5
xlab.tencent.com
Details Domain 6752
163.com
Details File 1
gpon-home-routers-hack.html
Details IPv4 1
142.11.217.116
Details Url 1
https://blog.netlab.360.com/wa-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/open-adb-ports-being-exploited-to-spread-possible-satori-variant-in-android-devices
Details Url 1
https://www.anquanke.com/post/id/85006
Details Url 1
https://securityaffairs.co/wordpress/71987/hacking/gpon-home-routers-hack.html
Details Url 1
https://xlab.tencent.com/cn/2018/01/05/a-new-way-to-exploit-cve-2017-17215
Details Url 1
https://isc.sans.edu/forums/diary/when