<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Electerm (&lt;= 3.7.8) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/electerm--3.7.8/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 18:43:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/electerm--3.7.8/feed.xml" rel="self" type="application/rss+xml"/><item><title>Electerm Remote Code Execution Vulnerability via Malicious Filenames</title><link>https://feed.craftedsignal.io/briefs/2024-01-electerm-rce/</link><pubDate>Fri, 08 May 2026 18:43:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-electerm-rce/</guid><description>A remote code execution vulnerability exists in Electerm versions 3.7.8 and earlier, where a malicious SSH server can inject arbitrary commands into a victim's system by crafting filenames with shell metacharacters that are executed when the user attempts to open or edit the file using the 'open with system editor' or 'edit with custom editor' feature.</description><content:encoded><![CDATA[<p>Electerm, a terminal/ssh/sftp client, is vulnerable to a remote code execution (RCE) attack (CVE-2026-43943) when using the &ldquo;open with system editor&rdquo; or &ldquo;Edit with custom editor&rdquo; feature. This vulnerability affects versions 3.7.8 and earlier. A malicious actor who controls the SSH server or has the ability to manipulate filenames can inject shell metacharacters into a filename. When a user attempts to open the file with the vulnerable feature, Electerm passes the filename directly to the command line without sanitization, leading to command execution with the user&rsquo;s privileges. This allows the attacker to potentially run arbitrary code, install malware, or move laterally within the network. The vulnerability was patched in version 3.7.9.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises or sets up a malicious SSH server.</li>
<li>Attacker creates a file with a specially crafted filename containing shell metacharacters (e.g., <code>evil; rm -rf /tmp; touch /tmp/pwned</code>).</li>
<li>Victim connects to the malicious SSH server using Electerm.</li>
<li>Victim browses the SFTP file system and sees the attacker-controlled filename.</li>
<li>Victim selects the malicious file and chooses the &ldquo;open with system editor&rdquo; or &ldquo;Edit with custom editor&rdquo; option.</li>
<li>Electerm executes a command to open the file, passing the malicious filename unsanitized to the system shell (e.g., <code>xdg-open &quot;evil; rm -rf /tmp; touch /tmp/pwned&quot;</code>).</li>
<li>The shell executes the injected commands, deleting files in <code>/tmp</code> and creating a file named <code>/tmp/pwned</code> in this example.</li>
<li>Attacker achieves arbitrary code execution on the victim&rsquo;s machine with the user&rsquo;s privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a malicious actor to execute arbitrary code on the victim&rsquo;s machine. This could lead to a variety of malicious outcomes, including malware installation, data theft, or lateral movement within the victim&rsquo;s network. The number of potential victims is limited to Electerm users who connect to untrusted SSH servers and use the vulnerable &ldquo;open with system editor&rdquo; or &ldquo;Edit with custom editor&rdquo; features. This vulnerability could have significant impact for developers and system administrators who rely on Electerm for remote server management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Electerm to version 3.7.9 or later to patch CVE-2026-43943.</li>
<li>Deploy the Sigma rule <code>Detect Electerm RCE via Filename</code> to detect exploitation attempts.</li>
<li>Until a patch can be applied, refrain from using the &ldquo;open with system editor&rdquo; or &ldquo;Edit with custom editor&rdquo; feature when connected to untrusted SSH servers, as recommended in the advisory.</li>
<li>If the &ldquo;open with system editor&rdquo; feature must be used, ensure connections are exclusively established with trusted servers and perform rigorous filename validation before editing.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>electerm</category><category>sftp</category><category>remote code execution</category></item></channel></rss>