<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>DCS-935L (&lt;= 1.10.01) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dcs-935l--1.10.01/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 02:17:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dcs-935l--1.10.01/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DCS-935L HNAP Service Buffer Overflow (CVE-2026-8260)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dlink-dcs-935l-buffer-overflow/</link><pubDate>Mon, 11 May 2026 02:17:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dlink-dcs-935l-buffer-overflow/</guid><description>D-Link DCS-935L devices up to version 1.10.01 are vulnerable to a remote buffer overflow (CVE-2026-8260) in the HNAP service that can be triggered by manipulating the AdminPassword argument in the SetDeviceSettings function.</description><content:encoded><![CDATA[<p>D-Link DCS-935L devices running firmware up to version 1.10.01 are susceptible to a buffer overflow vulnerability (CVE-2026-8260) affecting the HNAP (Home Network Administration Protocol) service. The vulnerability resides within the <code>SetDeviceSettings</code> function located in <code>/web/cgi-bin/hnap/hnap_service</code>. An attacker can remotely exploit this vulnerability by sending a specially crafted request that overflows the buffer allocated for the <code>AdminPassword</code> argument. Publicly available exploits exist, increasing the risk of exploitation. This vulnerability poses a significant threat to device confidentiality, integrity, and availability, as successful exploitation can lead to arbitrary code execution and full device compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a D-Link DCS-935L device running vulnerable firmware (&lt;= 1.10.01) accessible over the network.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/web/cgi-bin/hnap/hnap_service</code> endpoint.</li>
<li>The crafted request includes a <code>SetDeviceSettings</code> action with an <code>AdminPassword</code> argument containing a payload exceeding the expected buffer size.</li>
<li>The device processes the request, calling the <code>SetDeviceSettings</code> function.</li>
<li>Due to insufficient bounds checking, the oversized <code>AdminPassword</code> argument overwrites adjacent memory on the stack, including the return address.</li>
<li>The <code>SetDeviceSettings</code> function completes and attempts to return execution to the overwritten return address.</li>
<li>The attacker-controlled return address redirects execution to a malicious code payload injected within the <code>AdminPassword</code> argument or elsewhere in memory.</li>
<li>The attacker gains arbitrary code execution on the device, potentially leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8260 can lead to complete compromise of the affected D-Link DCS-935L device. This includes the ability to execute arbitrary code, gain unauthorized access to device settings and sensitive information, and potentially use the device as a bot in a larger attack. Given the widespread use of these devices, a large number of users are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from D-Link to mitigate CVE-2026-8260 on affected DCS-935L devices (reference: affected_products).</li>
<li>Monitor web server logs for suspicious POST requests to <code>/web/cgi-bin/hnap/hnap_service</code> with unusually long <code>AdminPassword</code> values in the request body (reference: rules).</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts against the HNAP service (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve</category><category>d-link</category></item></channel></rss>