<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AG1000-01A SMS Alert Gateway — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ag1000-01a-sms-alert-gateway/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 20:19:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ag1000-01a-sms-alert-gateway/feed.xml" rel="self" type="application/rss+xml"/><item><title>Taiko AG1000-01A SMS Alert Gateway Stored XSS (CVE-2026-9144)</title><link>https://feed.craftedsignal.io/briefs/2026-05-taiko-xss/</link><pubDate>Wed, 20 May 2026 20:19:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-taiko-xss/</guid><description>Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 is vulnerable to stored cross-site scripting (CVE-2026-9144) in the web configuration interface, allowing authenticated attackers to execute persistent JavaScript by fragmenting malicious payloads across multiple administrative form fields for persistent code execution.</description><content:encoded><![CDATA[<p>The Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-site scripting (XSS) vulnerability, identified as CVE-2026-9144, within its embedded web configuration interface. This flaw enables authenticated attackers to inject and execute persistent JavaScript code within the administrative dashboard. The attack involves bypassing front-end length restrictions by fragmenting malicious payloads across multiple administrative form fields, using techniques like JavaScript comments and template literals to concatenate executable script fragments. These fragments are then rendered in administrative dashboard views, such as index.zhtml, leading to persistent script execution whenever an administrator accesses the affected pages. This vulnerability poses a significant risk to the confidentiality and integrity of the SMS Alert Gateway.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Taiko AG1000-01A SMS Alert Gateway web configuration interface.</li>
<li>The attacker identifies multiple administrative form fields that allow input.</li>
<li>The attacker crafts a malicious JavaScript payload, designed to execute arbitrary commands or exfiltrate sensitive data.</li>
<li>The attacker fragments the payload into smaller chunks, using JavaScript comments (<code>/* ... */</code>) and template literals to bypass front-end length restrictions on the form fields.</li>
<li>The attacker submits the fragmented payload across multiple administrative form fields.</li>
<li>When an administrator accesses a dashboard view such as <code>index.zhtml</code>, the fragmented JavaScript payload is reassembled and executed within the administrator&rsquo;s browser.</li>
<li>The executed JavaScript can perform actions such as stealing administrator cookies, modifying configuration settings, or launching further attacks against the gateway.</li>
<li>The attacker achieves persistent code execution on the SMS Alert Gateway administrative interface, potentially compromising the entire system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability (CVE-2026-9144) could allow an attacker to compromise the Taiko AG1000-01A SMS Alert Gateway. The attacker could gain unauthorized access to sensitive configuration data, modify alert settings, or even use the gateway as a platform for launching further attacks. Given the nature of SMS alert gateways, a compromised device could be used to send malicious SMS messages, leading to potential phishing or malware distribution campaigns.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Taiko AG1000-01A Fragmented XSS Attempt</code> to detect attempts to inject malicious JavaScript by fragmenting payloads across multiple administrative form fields in web server logs.</li>
<li>Apply input validation and output encoding to all administrative form fields on the Taiko AG1000-01A SMS Alert Gateway to prevent XSS attacks.</li>
<li>Monitor web server logs for suspicious activity related to the web configuration interface, focusing on requests with fragmented JavaScript payloads.</li>
<li>Apply any available patches or updates from Taiko to address CVE-2026-9144.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>stored_xss</category><category>CVE-2026-9144</category><category>web_application</category></item><item><title>Taiko AG1000-01A SMS Alert Gateway Authentication Bypass (CVE-2026-9141)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-9141-taiko-auth-bypass/</link><pubDate>Wed, 20 May 2026 20:18:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-9141-taiko-auth-bypass/</guid><description>Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability (CVE-2026-9141) in the embedded web configuration interface, allowing unauthenticated attackers to access internal application pages, modify alarm routing, and disrupt monitoring and control functions.</description><content:encoded><![CDATA[<p>Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 is vulnerable to an authentication bypass (CVE-2026-9141). The embedded web configuration interface lacks proper session management and server-side authentication checks. This vulnerability allows unauthenticated attackers with network access to bypass authentication and directly access internal application pages. Successful exploitation grants attackers full administrative read and write access to the device. This allows them to modify alarm routing, device configuration, and disrupt monitoring and control functions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains network access to the Taiko AG1000-01A device.</li>
<li>The attacker sends an HTTP GET request to the device&rsquo;s web interface.</li>
<li>The attacker bypasses authentication by directly requesting internal resources such as <code>/index.zhtml</code>, <code>/point.zhtml</code>, or <code>/log.shtml</code>.</li>
<li>The web server, lacking authentication checks, serves the requested internal resource to the unauthenticated attacker.</li>
<li>The attacker analyzes the exposed configuration data in <code>index.zhtml</code> to understand device settings.</li>
<li>The attacker modifies alarm routing rules via <code>point.zhtml</code>, redirecting alerts to attacker-controlled systems.</li>
<li>The attacker alters device configuration settings, potentially disabling security features or adding malicious scripts via <code>point.zhtml</code>.</li>
<li>The attacker disrupts monitoring and control functions, leading to potential operational outages or safety incidents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-9141 allows unauthenticated attackers to gain full administrative access to the Taiko AG1000-01A SMS Alert Gateway. This can lead to unauthorized modification of alarm routing, device configuration, and disruption of monitoring and control functions. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical risk. Affected sectors include any organizations using this device for critical alerting, such as industrial control systems or emergency notification systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting direct access to sensitive ZHTML pages to identify potential exploitation attempts (see rules section).</li>
<li>Restrict network access to the Taiko AG1000-01A web interface to authorized personnel only using firewall rules (see network-based rule in rules section).</li>
<li>Monitor web server logs for requests to sensitive files (index.zhtml, point.zhtml, log.shtml) without prior authentication.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication-bypass</category><category>web-application</category><category>critical</category></item><item><title>Taiko AG1000-01A SMS Alert Gateway Hardcoded Credentials Vulnerability (CVE-2026-9139)</title><link>https://feed.craftedsignal.io/briefs/2026-05-taiko-ag1000-creds/</link><pubDate>Wed, 20 May 2026 20:18:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-taiko-ag1000-creds/</guid><description>Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability (CVE-2026-9139) in the embedded web configuration interface, allowing unauthenticated attackers with network access to recover administrative credentials directly from client-side JavaScript and gain full administrative access to the device.</description><content:encoded><![CDATA[<p>Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 are vulnerable to a critical security flaw (CVE-2026-9139) due to hard-coded credentials in the device&rsquo;s web configuration interface. The vulnerability stems from the authentication mechanism being implemented entirely in client-side JavaScript within the login.zhtml page. The static plaintext credentials are exposed directly in the page source, making them easily accessible to anyone with network access to the device. This vulnerability allows an unauthenticated attacker to recover administrative credentials and gain full administrative access, posing a significant risk to the device and potentially the wider network it is connected to.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the Taiko AG1000-01A SMS Alert Gateway device.</li>
<li>Attacker navigates to the device&rsquo;s web configuration interface, typically accessible via a web browser.</li>
<li>The web browser downloads the login.zhtml page containing the client-side JavaScript code.</li>
<li>Attacker views the page source of login.zhtml.</li>
<li>Attacker identifies the validate() function within the JavaScript code.</li>
<li>Attacker extracts the hard-coded plaintext administrative credentials from the validate() function.</li>
<li>Attacker uses the recovered credentials to log in to the web configuration interface as an administrator.</li>
<li>Attacker gains full administrative control of the Taiko AG1000-01A SMS Alert Gateway device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants an attacker full administrative access to the Taiko AG1000-01A SMS Alert Gateway. This could lead to unauthorized modification of device settings, disruption of SMS alert services, or potential use of the device as a pivot point for further attacks within the network. Given the critical nature of alert gateways in many operational environments, the impact could range from missed alerts to significant operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the following rule to detect access to the login page: &ldquo;Detect Access to Taiko AG1000 Login Page&rdquo;.</li>
<li>Deploy the &ldquo;Detect Taiko AG1000 Login Attempt with Exposed Credentials&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Disable the web configuration interface on Taiko AG1000-01A SMS Alert Gateway devices if it is not required.</li>
<li>Apply provided patch or upgrade to a version of Taiko AG1000-01A SMS Alert Gateway that addresses CVE-2026-9139.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve</category><category>hardcoded-credentials</category><category>network-device</category></item></channel></rss>