Briefs
April 2026 (30)
Tenda F456 Router Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.
Typecho <= 1.3.0 Server-Side Request Forgery Vulnerability (CVE-2026-7025)
2 rules 1 TTP 1 CVEA server-side request forgery (SSRF) vulnerability exists in Typecho up to version 1.3.0, allowing remote attackers to manipulate the X-Pingback/link argument in the Service::sendPingHandle function to potentially make arbitrary HTTP requests.
CVE-2026-31622 NFC-A Cascade Depth Bounds Check Failure
2 rules 1 TTP 1 CVECVE-2026-31622 describes a vulnerability related to an NFC bounds check issue, specifically a failure to properly validate NFC-A cascade depth in the SDD response handler within Microsoft products, potentially leading to unexpected behavior or security compromise.
CVE-2026-23398 ICMP NULL Pointer Dereference
2 rules 1 TTP 1 CVECVE-2026-23398 is a vulnerability related to a NULL pointer dereference in the ICMP protocol, potentially leading to a denial-of-service condition in affected Microsoft products.
SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)
2 rules 1 TTP 1 CVEA remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.
Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.
PicoClaw Web Launcher Management Plane Command Injection Vulnerability
2 rules 1 TTP 1 CVEPicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.
Claude Code Trust Dialog Bypass via Git Worktree Spoofing
2 rules 1 TTPA vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.
ERB Deserialization Bypass via def_module/def_method/def_class
2 rules 2 TTPs 1 CVEA deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.
Rclone Unauthenticated Remote Code Execution Vulnerabilities
2 rules 2 TTPs 2 CVEsRclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.
vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)
2 rules 1 TTP 1 CVEAn improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.
Microsoft Product Vulnerability CVE-2026-41080
2 rules 1 CVECVE-2026-41080 is a vulnerability affecting a Microsoft product; the specific product, impact, and exploitation details are currently undisclosed.
Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026
2 rules 1 TTPIn early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.
Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses
2 rules 1 TTPGemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.
k8sGPT Operator Vulnerable to Prompt Injection
2 rules 2 TTPsk8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.
BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2
2 rules 2 TTPs 1 CVEBridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.
Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization
2 rules 1 TTPRay Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.
Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud
2 rules 1 TTPA vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.
OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)
2 rules 1 TTP 1 CVEA remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.
Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)
2 rules 1 TTP 1 CVECVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.
OpenClaw Arbitrary Code Execution via Environment Variable Override (CVE-2026-41336)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 allows attackers to execute arbitrary code by overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable using a workspace .env file, enabling the loading of attacker-controlled hook code.
OpenClaw Cross-Site Request Forgery Vulnerability
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.
OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.
OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)
2 rules 2 TTPs 1 CVEOpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.
Apache ActiveMQ Vulnerabilities Allow RCE and XSS
2 rules 1 TTP 5 CVEsAn authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.
Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution
3 rules 3 TTPs 5 CVEsMultiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.
PhantomRPC: Windows RPC Privilege Escalation Vulnerability
2 rules 1 TTPA vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.
Flowise Multiple Vulnerabilities
2 rules 3 TTPs 5 CVEsMultiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.
Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution
2 rules 4 TTPs 3 CVEsMultiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.
D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability
2 rules 1 CVED-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.