<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>NWA1100-N Customized Firmware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nwa1100-n-customized-firmware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 04:18:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nwa1100-n-customized-firmware/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-7287 - Zyxel NWA1100-N Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-zyxel-dos/</link><pubDate>Tue, 12 May 2026 04:18:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zyxel-dos/</guid><description>A buffer overflow vulnerability in Zyxel NWA1100-N firmware allows a remote attacker to cause a denial-of-service by sending a crafted HTTP request to the webs binary.</description><content:encoded><![CDATA[<p>CVE-2026-7287 describes a buffer overflow vulnerability affecting Zyxel NWA1100-N devices running customized firmware version 1.00(AACE.1)C0. The vulnerability exists within the “webs” binary, specifically in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions. An attacker can exploit this flaw by sending a specially crafted HTTP request to the targeted device. Successful exploitation leads to a denial-of-service (DoS) condition, rendering the device unavailable. This vulnerability is classified as unsupported when assigned, indicating potential limitations in vendor support or remediation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Zyxel NWA1100-N device running firmware version 1.00(AACE.1)C0.</li>
<li>Attacker crafts a malicious HTTP request targeting the &ldquo;webs&rdquo; binary.</li>
<li>The HTTP request is designed to trigger a buffer overflow in one of the vulnerable functions: formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), or formDelcert().</li>
<li>The device processes the crafted HTTP request.</li>
<li>The vulnerable function attempts to write data beyond the allocated buffer.</li>
<li>The buffer overflow corrupts memory, leading to a crash or unexpected behavior within the &ldquo;webs&rdquo; process.</li>
<li>The &ldquo;webs&rdquo; process becomes unresponsive, causing a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7287 results in a denial-of-service (DoS) condition on the affected Zyxel NWA1100-N device. This means the device becomes unavailable to legitimate users, disrupting network connectivity and potentially impacting business operations. The NVD assigns this vulnerability a CVSS v3.1 base score of 7.5, indicating a high potential impact in terms of availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual HTTP requests targeting the vulnerable functions (<code>formWep</code>, <code>formWlAc</code>, <code>formPasswordSetup</code>, <code>formUpgradeCert</code>, <code>formDelcert</code>) on Zyxel devices, using a rule similar to the example below.</li>
<li>Consult the Zyxel end-of-life page referenced for potential mitigation strategies or device replacement options.</li>
<li>Since this CVE is marked as &ldquo;unsupported when assigned&rdquo;, consider network segmentation to limit the impact of a successful exploit if device replacement or patching is not possible.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>buffer overflow</category><category>cve-2026-7287</category></item></channel></rss>