Event JSON
{
"id": "5b69ea2fb3639c7fcc1a6946f8019227d8cd1312caf23151f8f943e68332edf6",
"pubkey": "389decd42685cf551af6d0534b945b67b54e5efb109420f594c9f63b1daed890",
"created_at": 1734213668,
"kind": 1,
"tags": [
[
"p",
"f0afa6cae715a5461cbe18dbc9230d95de2de260bd8fb9d41fcab1726840c20b",
"wss://relay.mostr.pub"
],
[
"p",
"b844b00e8db88aea80e199ad8800951376f5747c11c34b984779a867271d4527",
"wss://relay.mostr.pub"
],
[
"e",
"0ce91c59e307abe7f54084bcfc51deecdc9e4c0f9901b0beb46e0c8793594141",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.nz/users/keithduthie/statuses/113653426946196935",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq7zh6djh8zkj5v897rrdujgcdjh0zmcnqhk8mn4qle2chy6zqcg9slmdtx9 To be affected, you'd need to have used the \"attended sysupgrade\" process to build, download, and install a custom firmware upgrade image. So it's a fairly standard 9+ CVSS score - no evidence it was ever exploited in the wild, requires specific user action to be potentially affected, and already fixed upstream. Good advertising that the Attended Sysupgrade feature exists, though.",
"sig": "40532ddcefb5c5cb90673dd66e7c95df74d79288ba10cd21b7dbf5c9b405e957aecc157ce75bad3ca9f273cbb2119ab3dafad3345670d00ebb9404367df64cf9"
}