<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Magic B3 (&lt;= 100R002) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/magic-b3--100r002/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 22:17:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/magic-b3--100r002/feed.xml" rel="self" type="application/rss+xml"/><item><title>H3C Magic B3 Buffer Overflow Vulnerability (CVE-2026-8764)</title><link>https://feed.craftedsignal.io/briefs/2026-05-h3c-magic-b3-buffer-overflow/</link><pubDate>Sun, 17 May 2026 22:17:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-h3c-magic-b3-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the UpdateWanParams function of the /goform/aspForm file in H3C Magic B3 devices up to version 100R002, which can be exploited by manipulating the 'param' argument, leading to potential remote code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-8764, affects H3C Magic B3 devices up to version 100R002. The vulnerability is located within the <code>UpdateWanParams</code> function of the <code>/goform/aspForm</code> file. Successful exploitation of this flaw allows remote attackers to trigger a buffer overflow by manipulating the <code>param</code> argument. Publicly available exploits exist, increasing the risk of active exploitation. The vendor was notified about this vulnerability, but has not responded. This vulnerability allows for unauthenticated remote code execution if successfully exploited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an H3C Magic B3 device running a vulnerable firmware version (&lt;= 100R002) accessible over the network.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>/goform/aspForm</code> endpoint.</li>
<li>The POST request includes the <code>UpdateWanParams</code> function call with a crafted <code>param</code> argument designed to cause a buffer overflow.</li>
<li>The device processes the malicious <code>param</code> argument without proper bounds checking.</li>
<li>The excessive data in the <code>param</code> argument overwrites adjacent memory regions in the device&rsquo;s memory space.</li>
<li>The attacker carefully crafts the overflowed data to overwrite critical program data, such as return addresses or function pointers.</li>
<li>Upon function return, the hijacked execution flow redirects the program to attacker-controlled code.</li>
<li>Attacker achieves remote code execution on the device, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8764 allows an unauthenticated remote attacker to execute arbitrary code on the affected H3C Magic B3 device. This can lead to a complete compromise of the device, potentially enabling attackers to gain unauthorized access to the network, steal sensitive information, or use the device as a bot in a larger attack. Given the lack of vendor response, a large number of devices may be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2026-8764 Exploitation Attempt</code> to your SIEM system to detect HTTP requests attempting to exploit the buffer overflow in the <code>UpdateWanParams</code> function of the <code>/goform/aspForm</code> file.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/aspForm</code> containing unusually long <code>param</code> arguments, as highlighted in the Sigma rule and overview.</li>
<li>Given the affected product is H3C Magic B3, network administrators should investigate whether any deployed devices are affected.</li>
<li>Consult the references from NVD to determine if there are any vendor mitigations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>buffer overflow</category><category>remote code execution</category><category>CVE-2026-8764</category></item></channel></rss>