<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>NR1800X 9.1.0u.6279_B20210910 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nr1800x-9.1.0u.6279_b20210910/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 03:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nr1800x-9.1.0u.6279_b20210910/feed.xml" rel="self" type="application/rss+xml"/><item><title>Totolink NR1800X Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-7546, affects Totolink NR1800X routers running firmware version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>find_host_ip</code> function of the lighttpd web server component. By exploiting this flaw, a remote, unauthenticated attacker can trigger a stack-based buffer overflow through manipulation of the Host argument in an HTTP request. The publicly disclosed exploit allows attackers to potentially gain complete control of the device. This vulnerability poses a significant risk to home and small business networks utilizing the affected Totolink router model, as successful exploitation leads to arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X router running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker crafts a malicious HTTP request targeting the router&rsquo;s web interface.</li>
<li>The crafted request includes a <code>Host</code> header with a string exceeding the buffer size allocated in the <code>find_host_ip</code> function within the <code>lighttpd</code> component.</li>
<li>The router&rsquo;s <code>lighttpd</code> server processes the HTTP request and passes the <code>Host</code> header value to the vulnerable function.</li>
<li>The <code>find_host_ip</code> function attempts to store the oversized <code>Host</code> value in a stack-allocated buffer.</li>
<li>A stack-based buffer overflow occurs due to the insufficient buffer size.</li>
<li>The overflow overwrites adjacent memory on the stack, potentially including the return address.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7546 allows a remote attacker to execute arbitrary code on the vulnerable Totolink NR1800X device. This can lead to complete control of the router, allowing the attacker to modify router settings, intercept network traffic, or use the compromised router as a pivot point for further attacks within the network. Given the nature of stack-based buffer overflows, the attacker can potentially install persistent backdoors or malware. This presents a significant risk to users, potentially exposing sensitive data and infrastructure to unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches released by Totolink to remediate CVE-2026-7546.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting Totolink routers, specifically looking for abnormally long Host headers with the Sigma rule &ldquo;Detect Suspiciously Long Host Header&rdquo;.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Review and harden router configurations, including disabling remote administration if not required.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>remote code execution</category><category>buffer overflow</category><category>router</category></item><item><title>Totolink NR1800X Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</guid><description>A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7548, affects Totolink NR1800X router version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>sub_41A68C</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>setUssd</code> argument, a remote attacker can inject arbitrary commands into the system. Publicly available exploit code makes exploitation easier. This vulnerability poses a significant risk as it allows unauthenticated remote attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X device running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>setUssd</code> argument with a malicious payload designed to inject a command.</li>
<li>The <code>sub_41A68C</code> function processes the <code>setUssd</code> argument without proper sanitization.</li>
<li>The injected command is executed by the system with the privileges of the web server process.</li>
<li>The attacker gains initial access and can execute arbitrary commands on the device.</li>
<li>The attacker may then use the command execution to escalate privileges, install malware, or pivot to other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected Totolink NR1800X router. This could lead to complete compromise of the device, allowing the attacker to control network traffic, modify router settings, or use the router as a pivot point to attack other devices on the network. Given the wide usage of Totolink routers, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command injection attempts in the <code>setUssd</code> parameter, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/cgi-bin/cstecgi.cgi</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches provided by Totolink to address the CVE-2026-7548 vulnerability.</li>
<li>Deploy the Sigma rule to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>network</category></item></channel></rss>