<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Electerm (&gt;= 3.0.6, &lt; 3.8.15) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/electerm--3.0.6--3.8.15/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 18:46:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/electerm--3.0.6--3.8.15/feed.xml" rel="self" type="application/rss+xml"/><item><title>Electerm Arbitrary Code Execution via Crafted URI or CLI Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-05-electerm-code-exec/</link><pubDate>Fri, 08 May 2026 18:46:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-electerm-code-exec/</guid><description>Electerm versions 3.0.6 through 3.8.14 are vulnerable to arbitrary local code execution via crafted electerm:// URIs or command-line arguments, requiring a user to click a malicious link or open a malicious shortcut file.</description><content:encoded><![CDATA[<p>Electerm, a free and open-source terminal/ssh/sftp client, is vulnerable to arbitrary code execution. Versions 3.0.6 through 3.8.14 are susceptible to this vulnerability. An attacker can exploit this by crafting a malicious <code>electerm://</code> URI or by crafting a shortcut/command that launches electerm with attacker-controlled <code>--opts</code> arguments. Successful exploitation requires a user to click the malicious link or open the malicious shortcut file. This vulnerability allows attackers to execute arbitrary code on the victim&rsquo;s machine, potentially leading to system compromise, data theft, or other malicious activities. The vulnerability was reported by Curly-Haired-Baboon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious <code>electerm://</code> URI or a shortcut/command containing malicious <code>--opts</code> arguments.</li>
<li>The attacker distributes the malicious URI or shortcut/command to the victim via social engineering or other means.</li>
<li>The victim clicks on the malicious <code>electerm://</code> URI or opens the malicious shortcut/command.</li>
<li>Electerm is launched with the attacker-controlled parameters.</li>
<li>Due to insufficient validation of the input, the attacker&rsquo;s payload is processed by Electerm.</li>
<li>The attacker&rsquo;s payload executes arbitrary code on the victim&rsquo;s machine.</li>
<li>The attacker gains control of the compromised system, enabling them to perform malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary code execution on the victim&rsquo;s machine. This can result in a wide range of malicious activities, including but not limited to, system compromise, data theft, installation of malware, and denial of service. Given the nature of Electerm as a terminal client, attackers could potentially gain access to sensitive credentials and systems managed through the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Electerm to version 3.8.15 or later to patch CVE-2026-43944.</li>
<li>Disable or unregister electerm protocol handlers (Deep Link settings) as a workaround.</li>
<li>Avoid clicking <code>electerm://</code> links from untrusted sources.</li>
<li>Refrain from running electerm with untrusted <code>--opts</code> arguments or opening <code>.lnk</code> / <code>.desktop</code> files from untrusted sources.</li>
<li>Deploy the Sigma rule &ldquo;Detect Electerm URI Protocol Handler Abuse&rdquo; to identify attempts to exploit this vulnerability by monitoring process execution that involves the electerm protocol.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code-execution</category><category>protocol-handler</category><category>electerm</category></item></channel></rss>