<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>EDR-G9010 Series — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/edr-g9010-series/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 27 Apr 2026 14:42:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/edr-g9010-series/feed.xml" rel="self" type="application/rss+xml"/><item><title>Moxa Security Advisory Addresses Vulnerabilities in Multiple Router Series</title><link>https://feed.craftedsignal.io/briefs/2026-04-moxa-router-vulns/</link><pubDate>Mon, 27 Apr 2026 14:42:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-moxa-router-vulns/</guid><description>Moxa released a security advisory addressing CVE-2026-3867 and CVE-2026-3868, which affect TN-4900, EDR-8010, EDR-G9010, OnCell G4302-LTE4, OnCell G4308-LTE4, and EDF-G1002-BP series routers, potentially allowing for unauthorized access and control.</description><content:encoded><![CDATA[<p>On April 27, 2026, Moxa published a security advisory (MPSA-261521) to address vulnerabilities, specifically CVE-2026-3867 and CVE-2026-3868, affecting several of their industrial router products. These vulnerabilities reside in the firmware of TN-4900 Series (firmware version v3.22 and prior), EDR-8010 Series (firmware version v3.23 and prior), EDR-G9010 Series (firmware version v3.23.1 and prior), OnCell G4302-LTE4 Series (firmware version v3.23.0 and prior), OnCell G4308-LTE4 Series (firmware version v3.23.0 and prior), and EDF-G1002-BP Series (firmware version v3.23 and prior). Successful exploitation could allow attackers to gain unauthorized access or control over affected devices, potentially disrupting industrial processes and critical infrastructure. Defenders should promptly apply the recommended updates to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Moxa router, such as a TN-4900 series running firmware v3.22 or prior.</li>
<li>The attacker exploits CVE-2026-3867 (Improper Ownership Management) to manipulate file permissions on the device.</li>
<li>Exploiting the improper file ownership, the attacker overwrites critical system files with malicious versions.</li>
<li>The attacker exploits CVE-2026-3868 (Improper Handling of Length Parameter Inconsistency) to trigger a buffer overflow.</li>
<li>The buffer overflow allows the attacker to inject arbitrary code into the running system process.</li>
<li>The injected code provides the attacker with a reverse shell to the device with elevated privileges.</li>
<li>The attacker uses the reverse shell to gain full control over the router, modifying configurations and potentially disrupting network operations.</li>
<li>Finally, the attacker pivots to other devices on the network, using the compromised router as a launchpad for further attacks within the industrial control system (ICS) network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow unauthorized access and control of the affected Moxa routers. In industrial environments, this can lead to disruption of critical services, manipulation of industrial processes, and potential physical damage to equipment. Given the widespread use of Moxa devices in various sectors, including manufacturing, transportation, and energy, a successful attack could have significant consequences. The impact would vary depending on the specific industrial process controlled by the affected router, but could potentially affect dozens of organizations and even critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all affected Moxa devices (TN-4900, EDR-8010, EDR-G9010, OnCell G4302-LTE4, OnCell G4308-LTE4, and EDF-G1002-BP Series) to the latest firmware versions as recommended in the Moxa security advisory.</li>
<li>Monitor network traffic for unusual patterns or connections originating from Moxa routers, indicative of potential exploitation, by deploying the &ldquo;Detect Suspicious Outbound Connection from Moxa Router&rdquo; Sigma rule.</li>
<li>Implement strict access control policies to limit access to Moxa devices and segment the network to prevent lateral movement in case of a compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>router</category><category>industrial-control-systems</category></item></channel></rss>