<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Critical — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/severities/critical/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/severities/critical/feed.xml" rel="self" type="application/rss+xml"/><item><title>Arelle Unauthenticated Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-arelle-rce/</link><pubDate>Mon, 04 May 2026 18:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-arelle-rce/</guid><description>Arelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.</description><content:encoded><![CDATA[<p>Arelle versions prior to 2.39.10 are susceptible to an unauthenticated remote code execution (RCE) vulnerability. The vulnerability resides in the <code>/rest/configure</code> REST endpoint, which improperly handles the <code>plugins</code> query parameter. This parameter is forwarded to the plugin manager without proper authentication or authorization checks. An attacker can exploit this flaw by providing a URL pointing to a malicious Python file via the <code>plugins</code> parameter. Upon receiving this request, the Arelle webserver downloads and executes the attacker-supplied Python code within the context of the Arelle process. This grants the attacker control over the Arelle server with the same privileges as the Arelle process. This vulnerability poses a significant risk, especially in environments where Arelle servers are exposed to the internet or untrusted networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP GET request to the <code>/rest/configure</code> endpoint of the Arelle web server.</li>
<li>The request includes the <code>plugins</code> query parameter, which contains a URL pointing to a malicious Python file hosted on an attacker-controlled server.</li>
<li>The Arelle web server receives the request and, without proper authentication or authorization, forwards the <code>plugins</code> parameter to the plugin manager.</li>
<li>The plugin manager downloads the Python file from the attacker-supplied URL using standard HTTP(S) protocols.</li>
<li>The Arelle process executes the downloaded Python code using the Python interpreter.</li>
<li>The malicious Python code executes arbitrary commands on the Arelle server, potentially installing malware, creating reverse shells, or exfiltrating sensitive data.</li>
<li>The attacker gains control of the Arelle server and can perform further actions, such as accessing internal network resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to achieve remote code execution on the Arelle server. This could lead to complete compromise of the server, including sensitive data theft, malware deployment, and further lateral movement within the network. The potential impact includes data breaches, service disruption, and reputational damage. Given the severity and ease of exploitation, any Arelle instance running a version prior to 2.39.10 is at critical risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Arelle to version 2.39.10 or later to patch CVE-2026-42796.</li>
<li>Deploy the Sigma rule &ldquo;Detect Arelle Plugin Download via REST Endpoint&rdquo; to identify exploitation attempts targeting the vulnerable <code>/rest/configure</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>/rest/configure</code> endpoint containing the <code>plugins</code> parameter.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Arelle server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>arelle</category><category>vulnerability</category></item><item><title>BusyBox DHCPv6 Client Heap Buffer Overflow Vulnerability (CVE-2026-29004)</title><link>https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</link><pubDate>Mon, 04 May 2026 18:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</guid><description>A heap buffer overflow vulnerability in BusyBox's DHCPv6 client allows network-adjacent attackers to trigger memory corruption, denial of service, or arbitrary code execution via crafted DHCPv6 responses.</description><content:encoded><![CDATA[<p>CVE-2026-29004 is a critical heap buffer overflow vulnerability affecting BusyBox before commit 42202bf. The vulnerability resides in the DHCPv6 client (udhcpc6), specifically within the DNS_SERVERS option handler located in networking/udhcp/d6_dhcpc.c. A network-adjacent attacker can exploit this flaw by sending a malicious DHCPv6 response containing a malformed D6_OPT_DNS_SERVERS option. This manipulation leads to incorrect heap buffer allocation calculations in the option_to_env() function, causing memory corruption. Successful exploitation can result in a denial of service or, more severely, arbitrary code execution on vulnerable embedded systems lacking heap hardening. The scope of impact is potentially broad, given BusyBox&rsquo;s widespread use in embedded devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target embedded system running a vulnerable version of BusyBox with the DHCPv6 client enabled.</li>
<li>The attacker crafts a malicious DHCPv6 response packet.</li>
<li>The crafted packet includes a D6_OPT_DNS_SERVERS option with a size that exceeds the expected buffer allocation.</li>
<li>The attacker transmits the crafted DHCPv6 response packet to the target system on the local network.</li>
<li>The target system&rsquo;s udhcpc6 client receives the malicious DHCPv6 response.</li>
<li>The udhcpc6 client processes the D6_OPT_DNS_SERVERS option, triggering the vulnerable option_to_env() function.</li>
<li>The option_to_env() function calculates an insufficient buffer size based on the malformed option.</li>
<li>A heap buffer overflow occurs when copying the oversized DNS server list, leading to memory corruption, denial-of-service, or arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29004 can have severe consequences. A denial-of-service condition could disrupt the functionality of the affected embedded system. More critically, arbitrary code execution allows attackers to gain complete control over the device, potentially leading to data theft, device compromise, or use in botnet activities. Given BusyBox&rsquo;s prevalence in embedded systems, a large number of devices are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch addressing CVE-2026-29004 by updating to a version of BusyBox after commit 42202bf.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious DHCPv6 DNS Server Option Size&rdquo; to identify potentially malicious DHCPv6 responses in network traffic.</li>
<li>Monitor network traffic for unusually large DHCPv6 DNS_SERVERS options as indicated by the Sigma rule and network connection logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap-overflow</category><category>dhcpv6</category><category>busybox</category><category>cve-2026-29004</category><category>denial-of-service</category></item><item><title>OpenMRS Module Upload Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</link><pubDate>Mon, 04 May 2026 17:39:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</guid><description>OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.</description><content:encoded><![CDATA[<p>OpenMRS, an open-source enterprise electronic medical record system platform, is vulnerable to a path traversal (Zip Slip) vulnerability in its module upload functionality. Discovered in versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, the vulnerability resides in the <code>POST /openmrs/ws/rest/v1/module</code> endpoint. An authenticated attacker with administrative privileges can exploit this flaw by uploading a specially crafted <code>.omod</code> archive containing malicious ZIP entries with directory traversal sequences. This can allow the attacker to write files outside of the intended module directory, potentially leading to arbitrary file write and remote code execution on the server. The vulnerability stems from incomplete path validation within the <code>WebModuleUtil.startModule()</code> function, an oversight compared to other extraction methods within the same codebase that are properly protected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the OpenMRS instance with valid admin credentials via Basic Auth.</li>
<li>The attacker crafts a malicious <code>.omod</code> file containing a ZIP entry with a path traversal payload, such as <code>web/module/../../../../&lt;target_filename&gt;.jsp</code>.</li>
<li>The attacker sends a <code>POST</code> request to the <code>/openmrs/ws/rest/v1/module</code> endpoint, uploading the malicious <code>.omod</code> file.</li>
<li>The server receives the request and parses the uploaded <code>.omod</code> file, treating it as a ZIP archive.</li>
<li>During module loading via <code>WebModuleUtil.startModule()</code>, the server extracts entries under the <code>web/module/</code> directory.</li>
<li>Due to an incomplete check, the entry <code>web/module/../../../../&lt;target_filename&gt;.jsp</code> passes the initial validation.</li>
<li>The server attempts to write the extracted file to a path constructed by concatenating the traversed path, resulting in writing the file outside the intended <code>WEB-INF/view/module/</code> directory.</li>
<li>If the written file is a JSP script, accessing it via a browser triggers server-side execution, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files within the web application root directory of the OpenMRS instance. This can lead to remote code execution, allowing the attacker to gain complete control of the affected server. Given OpenMRS&rsquo;s use in healthcare environments, a successful attack could compromise sensitive patient data, disrupt medical operations, and damage the reputation of the affected organization. The number of potentially affected installations is unknown, but the vulnerability impacts a widely used version of the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of OpenMRS that includes the fix for CVE-2026-40076 to address the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect OpenMRS Malicious Module Upload</code> to identify exploitation attempts based on HTTP requests to the <code>/openmrs/ws/rest/v1/module</code> endpoint with suspicious file extensions in the query parameters.</li>
<li>Enable webserver logging to capture HTTP request data and facilitate detection and investigation efforts.</li>
<li>Monitor file creation events within the web application root directory for suspicious JSP files. Use the Sigma rule <code>Detect JSP File Creation in Web Application Root</code> as a starting point.</li>
<li>Enforce the <code>module.allow_web_admin</code> restriction consistently across all module upload entry points, including the REST API to prevent bypass.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>zip-slip</category><category>rce</category><category>openmrs</category><category>web-application</category></item><item><title>Qualcomm PLC FW Buffer Overflow via Incorrect Authorization (CVE-2026-25293)</title><link>https://feed.craftedsignal.io/briefs/2026-05-plc-buffer-overflow/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-plc-buffer-overflow/</guid><description>CVE-2026-25293 is a critical buffer overflow vulnerability in Qualcomm PLC FW due to incorrect authorization, potentially allowing unauthorized access and control over programmable logic controllers.</description><content:encoded><![CDATA[<p>CVE-2026-25293 describes a buffer overflow vulnerability affecting Qualcomm&rsquo;s Programmable Logic Controller Firmware (PLC FW).  The root cause is an incorrect authorization mechanism within the firmware. This flaw could allow an attacker to potentially overwrite memory buffers, leading to arbitrary code execution or denial of service. The vulnerability was disclosed in Qualcomm&rsquo;s May 2026 security bulletin. Successful exploitation of this vulnerability could allow unauthorized modification of PLC configurations, potentially impacting industrial control systems and automation processes. The affected PLC FW is used in a range of industrial applications, increasing the scope and severity of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PLC FW device on the network.</li>
<li>The attacker leverages CVE-2026-25293 to bypass authorization checks.</li>
<li>A crafted network packet is sent to the PLC FW, exploiting the buffer overflow.</li>
<li>The overflowed buffer overwrites critical memory regions.</li>
<li>Attacker gains control of PLC FW execution flow.</li>
<li>Malicious code is injected into the PLC memory space.</li>
<li>The injected code executes, potentially modifying PLC logic or disrupting operations.</li>
<li>The attacker achieves unauthorized control over the PLC, leading to disruption, data manipulation, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-25293 could allow attackers to gain complete control over Programmable Logic Controllers (PLCs). This could lead to significant disruptions in industrial control systems, manufacturing processes, and other automated systems. The vulnerability affects Qualcomm PLC FW, potentially impacting a large number of devices across various sectors. The high CVSS score of 9.6 reflects the critical impact of this vulnerability, including the potential for complete system compromise and denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches provided by Qualcomm as detailed in their May 2026 security bulletin (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html">https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html</a>) to remediate CVE-2026-25293.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Network Traffic to PLC Devices&rdquo; to identify potential exploitation attempts.</li>
<li>Implement strict network segmentation to limit the attack surface and prevent lateral movement to PLC devices.</li>
<li>Monitor network traffic for unexpected patterns or unauthorized access attempts to PLC devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>plc</category><category>buffer-overflow</category><category>industrial-control-systems</category><category>cve-2026-25293</category></item><item><title>NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)</title><link>https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</guid><description>NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.</description><content:encoded><![CDATA[<p>NetBox, a widely-used infrastructure resource modeling application, is vulnerable to remote code execution (RCE) in versions 4.3.5 through 4.5.4. This vulnerability, identified as CVE-2026-29514, resides in the <code>RenderTemplateMixin.get_environment_params()</code> method. An authenticated attacker with <code>exporttemplate</code> or <code>configtemplate</code> permissions can exploit this flaw by injecting malicious Python callables into the <code>environment_params</code> field. Successful exploitation allows the attacker to bypass the Jinja2 SandboxedEnvironment, achieving arbitrary code execution as the NetBox service user. This RCE can lead to complete system compromise, data exfiltration, or denial of service. Defenders should prioritize patching and implement the detection measures outlined below.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the NetBox web application with <code>exporttemplate</code> or <code>configtemplate</code> permissions.</li>
<li>The attacker crafts a malicious request to modify or create an export/config template.</li>
<li>Within the request, the attacker injects a Python callable, such as <code>subprocess.getoutput</code>, into the <code>environment_params</code> field. The <code>finalize</code> parameter of the Jinja2 environment is set to this callable.</li>
<li>NetBox processes the request, and the Jinja2 environment is initialized with the attacker-controlled <code>finalize</code> parameter.</li>
<li>When the template is rendered, every expression outside the sandbox&rsquo;s call interception mechanism is processed.</li>
<li>The injected callable (<code>subprocess.getoutput</code>) is invoked on the rendered expression.</li>
<li>The <code>subprocess.getoutput</code> callable executes arbitrary shell commands as the NetBox service user.</li>
<li>The attacker gains remote code execution, potentially leading to full system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29514 allows an authenticated attacker to execute arbitrary code on the NetBox server. The impact includes potential full system compromise, data exfiltration, and denial of service. Given that NetBox is often used to manage critical infrastructure information, a successful attack could have significant consequences, potentially affecting numerous organizations that rely on accurate network data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NetBox to a patched version (4.5.5 or later) to remediate CVE-2026-29514.</li>
<li>Implement the provided Sigma rule to detect attempts to inject malicious callables into <code>environment_params</code> via webserver logs.</li>
<li>Review and restrict <code>exporttemplate</code> and <code>configtemplate</code> permissions to only those users who require them.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>template-injection</category><category>netbox</category><category>cve-2026-29514</category></item><item><title>Critical Authentication Bypass Vulnerability in MOVEit Automation (CVE-2026-4670)</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-auth-bypass/</link><pubDate>Mon, 04 May 2026 15:08:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-auth-bypass/</guid><description>A critical authentication bypass vulnerability (CVE-2026-4670) in Progress MOVEit Automation allows an unauthenticated remote attacker to gain administrative access, potentially leading to full control over the application and sensitive file transfer workflows.</description><content:encoded><![CDATA[<p>Progress MOVEit Automation is affected by a critical authentication bypass vulnerability, CVE-2026-4670, which has a CVSS score of 9.8. Successful exploitation allows an unauthenticated remote attacker to gain administrative access to the vulnerable service. Additionally, a high severity privilege escalation vulnerability, CVE-2026-5174, exists due to improper input validation. While there is no current evidence of active exploitation in the wild, the historical targeting of Managed File Transfer (MFT) solutions, such as the 2023 Cl0p ransomware campaigns targeting MOVEit Transfer, heightens the urgency of patching this vulnerability. The affected versions of MOVEit Automation include versions prior to 2024.0.0, versions 2024.0.0 before 2024.1.8, versions 2025.0.0 before 2025.0.9, and versions 2025.1.0 before 2025.1.5. Defenders should prioritize patching to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to the MOVEit Automation server, exploiting CVE-2026-4670 (authentication bypass).</li>
<li>The vulnerable MOVEit Automation software fails to properly validate the attacker&rsquo;s identity, granting them unauthorized access.</li>
<li>The attacker gains access to the MOVEit Automation application with administrative privileges.</li>
<li>The attacker leverages CVE-2026-5174 (improper input validation) to further escalate privileges within the application.</li>
<li>The attacker manipulates sensitive file transfer workflows, potentially modifying file permissions or altering transfer schedules.</li>
<li>The attacker exfiltrates sensitive data stored within MOVEit Automation.</li>
<li>Alternatively, the attacker could deploy malicious scripts or backdoors to maintain persistence and control over the system.</li>
<li>The attacker achieves complete control over the MOVEit Automation server, potentially impacting connected systems and data integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4670 allows an unauthenticated attacker to gain administrative access to Progress MOVEit Automation servers. This can lead to the compromise of sensitive data, disruption of file transfer workflows, and potential deployment of ransomware or other malicious payloads. Given the history of MOVEit products being targeted, a successful attack could have widespread impact across various sectors that rely on MOVEit for secure file transfer, potentially affecting thousands of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all affected MOVEit Automation installations to versions 2025.1.5 or later, 2025.0.9 or later, or 2024.1.8 or later as recommended by Progress Software to remediate CVE-2026-4670 and CVE-2026-5174.</li>
<li>Upscale monitoring and detection capabilities to identify any suspicious activity related to MOVEit Automation, as recommended by the CCB.</li>
<li>Implement the provided Sigma rule &ldquo;Detect MOVEit Automation Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-4670 based on web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>authentication-bypass</category><category>privilege-escalation</category><category>cve-2026-4670</category><category>cve-2026-5174</category><category>webserver</category></item><item><title>SambaBox OS Command Injection Vulnerability (CVE-2026-3120)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sambabox-code-injection/</link><pubDate>Mon, 04 May 2026 12:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sambabox-code-injection/</guid><description>SambaBox versions 5.1 to before 5.3 are vulnerable to OS command injection via improper control of code generation (CVE-2026-3120), potentially allowing attackers with high privileges to execute arbitrary commands on the underlying system.</description><content:encoded><![CDATA[<p>CVE-2026-3120 is a critical vulnerability affecting SambaBox, a product by Profelis Information and Consulting Trade and Industry Limited Company. This vulnerability, categorized as an Improper Control of Generation of Code (&lsquo;Code Injection&rsquo;), allows for OS Command Injection. Specifically, SambaBox versions 5.1 up to (but not including) version 5.3 are affected. An attacker with high privileges can exploit this vulnerability to execute arbitrary commands on the underlying operating system, potentially leading to full system compromise. This vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey (USOM). Defenders should patch affected systems immediately or apply mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with high privileges gains access to the SambaBox management interface.</li>
<li>The attacker crafts a malicious request containing an OS command within a vulnerable input field.</li>
<li>The SambaBox application fails to properly sanitize or validate the input.</li>
<li>The application generates code incorporating the unsanitized input.</li>
<li>The generated code is executed by the underlying operating system.</li>
<li>The injected OS command is executed with the privileges of the SambaBox application.</li>
<li>The attacker gains the ability to execute arbitrary commands on the server.</li>
<li>The attacker leverages the command execution to achieve persistence, escalate privileges further, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3120 allows an attacker to execute arbitrary commands on the SambaBox server. This could lead to complete system compromise, including data theft, modification, or destruction. The vulnerability affects SambaBox installations from version 5.1 before 5.3, potentially impacting all organizations using these versions. Given the high CVSS score of 7.2, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SambaBox to version 5.3 or later to patch CVE-2026-3120.</li>
<li>Apply the following Sigma rule to detect potential exploitation attempts by monitoring for suspicious process execution: &ldquo;Detect SambaBox Command Injection&rdquo;.</li>
<li>Monitor web server logs for unusual requests targeting SambaBox applications, specifically looking for attempts to inject OS commands.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code-injection</category><category>os-command-injection</category><category>cve-2026-3120</category></item><item><title>Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</link><pubDate>Mon, 04 May 2026 11:28:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bitwarden-cli-compromise/</guid><description>A remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.</description><content:encoded><![CDATA[<p>A compromised Bitwarden CLI npm package allows a remote, anonymous attacker to steal credentials and exfiltrate sensitive information. The specific version of the compromised package is not detailed in the advisory. This supply chain attack targets developers and users who rely on the Bitwarden CLI for managing their passwords and secrets. This attack has the potential to expose sensitive credentials, leading to unauthorized access to systems and data. Defenders need to monitor for unusual activity related to the Bitwarden CLI and its usage within their environments to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a Bitwarden CLI npm package through techniques such as typosquatting, account compromise, or dependency confusion.</li>
<li>Unsuspecting developers or users download and install the compromised package from the npm registry.</li>
<li>During installation, the malicious package executes malicious code injected by the attacker.</li>
<li>The malicious code collects Bitwarden credentials and other sensitive information stored in the CLI&rsquo;s configuration.</li>
<li>The compromised package establishes a covert communication channel (e.g., HTTPS) to an attacker-controlled server.</li>
<li>Stolen credentials and sensitive information are exfiltrated to the attacker&rsquo;s server.</li>
<li>The attacker uses the stolen credentials to access victim&rsquo;s Bitwarden vaults or other systems.</li>
<li>The attacker may further escalate privileges and compromise additional systems within the victim&rsquo;s environment using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of sensitive credentials and information stored within Bitwarden CLI. The number of victims is currently unknown. Organizations using the compromised package could experience unauthorized access to critical systems, data breaches, and potential financial losses. The targeted sectors are broad, encompassing any organization utilizing the Bitwarden CLI for password management and secret storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for unusual activity or unexpected dependencies using process creation logs and file integrity monitoring.</li>
<li>Implement strict code review processes for all third-party dependencies, especially those related to security tools like Bitwarden CLI.</li>
<li>Deploy the Sigma rule detecting suspicious network connections from the Bitwarden CLI executable to identify potential data exfiltration.</li>
<li>Enforce multi-factor authentication (MFA) on Bitwarden accounts to mitigate the impact of credential theft.</li>
<li>Regularly audit and review the permissions and access rights associated with Bitwarden CLI credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>exfiltration</category><category>npm</category></item><item><title>Rancher Vulnerability Allows Remote Code Execution and File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-05-rancher-code-execution/</link><pubDate>Mon, 04 May 2026 11:26:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rancher-code-execution/</guid><description>An authenticated, remote attacker can exploit a vulnerability in Rancher to execute arbitrary program code and manipulate files, potentially leading to privilege escalation and system compromise.</description><content:encoded><![CDATA[<p>A vulnerability exists within Rancher that allows a remote, authenticated attacker to execute arbitrary code and manipulate files on the system. The specific details of the vulnerability are not provided in the source, but the impact allows for significant control over the Rancher instance. This issue affects Rancher installations and poses a severe risk, as successful exploitation can lead to complete system compromise, data breaches, and unauthorized access to managed resources. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains valid credentials to a Rancher instance through credential harvesting or other means.</li>
<li>The attacker authenticates to the Rancher web interface or API.</li>
<li>The attacker exploits an unspecified vulnerability to inject and execute arbitrary code on the Rancher server.</li>
<li>The attacker leverages the code execution vulnerability to escalate privileges within the Rancher system.</li>
<li>The attacker uses the escalated privileges to manipulate critical Rancher configuration files.</li>
<li>The attacker uses file manipulation capabilities to inject malicious code into Rancher-managed containers or infrastructure.</li>
<li>The attacker establishes persistent access through backdoors or compromised service accounts.</li>
<li>The attacker pivots to other systems or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Rancher instance, including the ability to control and manipulate all managed Kubernetes clusters and related infrastructure. This can result in significant data breaches, service disruptions, and unauthorized access to sensitive resources. The number of victims and sectors targeted are currently unknown, but the severity of the potential impact necessitates immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting suspicious Rancher process execution and tune for your environment to identify potential exploitation attempts.</li>
<li>Investigate any unauthorized file modifications within the Rancher installation directory using the provided file integrity monitoring rule.</li>
<li>Monitor Rancher access logs for unusual login patterns or suspicious API calls.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rancher</category><category>code-execution</category><category>file-manipulation</category></item><item><title>OPNsense Multiple Vulnerabilities Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</link><pubDate>Mon, 04 May 2026 11:09:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</guid><description>A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities in OPNsense allow a remote, anonymous attacker to bypass security restrictions and achieve arbitrary code execution. The vulnerabilities stem from inadequate input validation and insufficient privilege checks within the OPNsense firewall software. While the specific vulnerable components are not detailed in the advisory, successful exploitation would grant an attacker complete control over the affected OPNsense instance. This can lead to a complete breach of the network perimeter, allowing the attacker to pivot to internal systems, intercept network traffic, or disrupt network services. Given the critical role of OPNsense as a network gateway, organizations using this software should prioritize detection and mitigation efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OPNsense instance accessible over the network.</li>
<li>The attacker crafts a malicious request targeting a specific, undisclosed vulnerable endpoint. This request exploits a flaw in input validation or authentication.</li>
<li>The vulnerable OPNsense component processes the malicious request without proper sanitization or authorization checks.</li>
<li>The injected payload bypasses security restrictions, potentially exploiting a command injection or similar vulnerability.</li>
<li>The injected payload executes arbitrary code on the OPNsense system, gaining initial access.</li>
<li>The attacker leverages the initial foothold to escalate privileges within the OPNsense system.</li>
<li>The attacker establishes persistence, ensuring continued access even after system reboots or security updates.</li>
<li>The attacker pivots to other systems within the network, using the compromised OPNsense instance as a launchpad for further attacks, or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote attacker to execute arbitrary code on the OPNsense firewall. This gives the attacker full control of the firewall, allowing them to intercept network traffic, modify firewall rules, and potentially pivot to internal networks. The impact is a complete compromise of the network perimeter, potentially affecting all systems and data behind the firewall. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor OPNsense webserver logs for suspicious POST requests to unusual or sensitive endpoints, using a webserver category Sigma rule (see example below).</li>
<li>Implement network intrusion detection systems (NIDS) rules to detect exploitation attempts against OPNsense services.</li>
<li>While specific CVEs are unavailable, stay informed about OPNsense security updates and apply them immediately upon release.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>firewall</category></item><item><title>Langflow Multiple Vulnerabilities Allow Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</link><pubDate>Mon, 04 May 2026 10:39:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</guid><description>An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.</description><content:encoded><![CDATA[<p>Langflow is vulnerable to multiple security flaws that could allow a remote attacker to execute arbitrary code on the affected system. Successful exploitation of these vulnerabilities requires the attacker to be authenticated. The specific nature of these vulnerabilities is not detailed in the advisory, however the potential impact is severe, allowing for complete system compromise if successfully exploited. Defenders should prioritize identifying and mitigating installations of Langflow that are exposed to untrusted networks or users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker gains initial access to the Langflow application.</li>
<li>The attacker crafts a malicious request targeting one of the unspecified vulnerabilities.</li>
<li>The malicious request is sent to the Langflow server.</li>
<li>The Langflow server processes the request, triggering the vulnerability.</li>
<li>The vulnerability allows the attacker to inject arbitrary code into the Langflow process.</li>
<li>The injected code executes within the context of the Langflow application.</li>
<li>The attacker leverages the initial code execution to escalate privileges.</li>
<li>The attacker achieves arbitrary code execution on the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote, authenticated attacker to execute arbitrary code on the Langflow server. This could lead to a complete compromise of the affected system, including the theft of sensitive data, the installation of malware, and the disruption of services. Given the lack of specific vulnerability details, it is difficult to estimate the precise number of potentially affected installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Langflow application logs for suspicious activity indicative of unauthorized access or code execution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Implement strict access controls for the Langflow application to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>code-execution</category><category>web-application</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7750, affects Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setMacFilterRules</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. Attackers can exploit this flaw by sending a specially crafted POST request with an overly long <code>mac_address</code> parameter, triggering a buffer overflow. Successful exploitation allows for arbitrary code execution on the device. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread attacks. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>mac_address</code> parameter, injecting a string longer than the buffer allocated for it.</li>
<li>The <code>setMacFilterRules</code> function processes the POST request without proper bounds checking on the <code>mac_address</code> argument.</li>
<li>The overly long <code>mac_address</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The injected code executes with the privileges of the web server, allowing the attacker to execute arbitrary commands.</li>
<li>The attacker gains complete control over the router, potentially using it for further malicious activities such as network pivoting, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7750 allows a remote attacker to execute arbitrary code on the vulnerable Totolink N300RH device. This could lead to a complete compromise of the router, allowing the attacker to control network traffic, steal sensitive information, or use the router as a bot in a larger attack. Given the public availability of the exploit, a large number of unpatched devices could be vulnerable to automated attacks, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7750.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block suspicious POST requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with excessively long <code>mac_address</code> parameters.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for unusual POST requests to <code>/cgi-bin/cstecgi.cgi</code>, focusing on requests with large <code>mac_address</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve</category><category>webserver</category></item><item><title>GNU InetUtils Multiple Vulnerabilities Allow Code Execution and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-05-gnu-inetutils-vulns/</link><pubDate>Mon, 04 May 2026 09:54:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gnu-inetutils-vulns/</guid><description>Multiple vulnerabilities in GNU InetUtils allow a remote attacker to execute arbitrary code and disclose sensitive information.</description><content:encoded><![CDATA[<p>GNU InetUtils is susceptible to multiple vulnerabilities that could lead to serious security breaches. These vulnerabilities could allow an attacker to execute arbitrary code on the affected system and also enable them to disclose sensitive information. The specific nature of these vulnerabilities is not detailed in the advisory, but the potential impact is significant, requiring immediate attention from system administrators to mitigate potential risks associated with vulnerable InetUtils installations. Given the lack of specific CVEs or exploitation details, organizations should prioritize identifying and patching potentially vulnerable systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable InetUtils service running on a target system.</li>
<li>The attacker crafts a malicious input specifically designed to exploit a buffer overflow or similar vulnerability within a utility like <code>ftp</code>, <code>telnet</code>, or <code>rcp</code>.</li>
<li>The malicious input is sent to the vulnerable InetUtils service. This could be achieved by sending a specially crafted request to the service&rsquo;s listening port.</li>
<li>The vulnerability is triggered, leading to arbitrary code execution within the context of the InetUtils service.</li>
<li>The attacker leverages the initial code execution to escalate privileges on the system, potentially gaining root or administrator access.</li>
<li>With elevated privileges, the attacker installs persistent backdoors for future access.</li>
<li>The attacker proceeds to gather sensitive information from the compromised system, such as user credentials, configuration files, or database contents.</li>
<li>Finally, the attacker exfiltrates the stolen data to an external server under their control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to arbitrary code execution, potentially granting an attacker complete control over the compromised system. This could result in data breaches, system downtime, and reputational damage. The advisory does not specify the number of victims or sectors targeted, but the potential impact is widespread due to the common usage of InetUtils. A successful attack could lead to the complete compromise of affected systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all systems running GNU InetUtils and determine the installed version.</li>
<li>Monitor network traffic for suspicious activity targeting InetUtils services (e.g., unusual commands or large data transfers) using network_connection logs.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect potential exploitation attempts targeting InetUtils.</li>
<li>Investigate and patch any identified vulnerabilities in GNU InetUtils immediately upon patch availability from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>inetutils</category><category>code-execution</category><category>information-disclosure</category></item><item><title>XZ Utility Vulnerability Allows Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-xz-code-execution/</link><pubDate>Mon, 04 May 2026 09:34:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-xz-code-execution/</guid><description>A remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.</description><content:encoded><![CDATA[<p>A vulnerability exists within the xz compression utility that allows for arbitrary code execution. While the specific details of the vulnerability are not disclosed in this advisory, the potential impact is severe. An unauthenticated, remote attacker can leverage this flaw to execute code on a vulnerable system. The affected component is the xz utility, a widely used data compression tool in Linux distributions. Defenders should assume a broad potential impact, including data compromise, system instability, and potential for lateral movement within a compromised network. The lack of detailed information necessitates immediate investigation and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable system running the xz utility.</li>
<li>The attacker crafts a malicious payload designed to exploit the undisclosed vulnerability within xz.</li>
<li>The attacker delivers the malicious payload to the vulnerable system. The specific delivery mechanism is not detailed (e.g., network service, malicious file).</li>
<li>The xz utility processes the malicious payload, triggering the vulnerability.</li>
<li>Due to the vulnerability, the attacker gains the ability to execute arbitrary code on the targeted system.</li>
<li>The attacker&rsquo;s code executes with the privileges of the xz process, potentially allowing for elevated privileges.</li>
<li>The attacker may then install a backdoor or other persistent mechanism to maintain access to the compromised system.</li>
<li>The attacker pivots to other systems on the network or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the targeted system. This can lead to complete system compromise, data theft, and further malicious activities within the network. Given the widespread use of the xz utility, a large number of systems are potentially vulnerable. The impact could range from disruption of services to significant data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate systems running the xz utility for suspicious activity.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts.</li>
<li>Monitor process execution for unexpected activity originating from the xz utility using process_creation logs.</li>
<li>Implement network monitoring to identify suspicious connections originating from systems where xz is used.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>xz</category><category>code-execution</category><category>linux</category></item><item><title>Totolink WA300 Buffer Overflow Vulnerability (CVE-2026-7719)</title><link>https://feed.craftedsignal.io/briefs/2024-01-totolink-wa300-buffer-overflow/</link><pubDate>Mon, 04 May 2026 02:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totolink-wa300-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink WA300 version 5.2cu.7112_B20190227 within the loginauth function of the /cgi-bin/cstecgi.cgi file, specifically affecting the POST Request Handler component, triggerable via manipulation of the http_host argument, and remotely exploitable with a publicly available exploit.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7719, has been discovered in Totolink WA300 version 5.2cu.7112_B20190227. This vulnerability resides within the <code>loginauth</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file, affecting the POST Request Handler component. The vulnerability is triggered by manipulating the <code>http_host</code> argument in a POST request. The exploit is publicly available, increasing the risk of widespread exploitation. This vulnerability allows for remote code execution, potentially granting attackers full control over the affected device. The affected version was released in February 2019. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink WA300 device running firmware version 5.2cu.7112_B20190227.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted POST request includes a specially crafted <code>http_host</code> argument designed to overflow the buffer in the <code>loginauth</code> function.</li>
<li>The vulnerable <code>loginauth</code> function processes the <code>http_host</code> argument without proper bounds checking.</li>
<li>The oversized <code>http_host</code> argument overwrites adjacent memory regions, including the return address on the stack.</li>
<li>Upon completion of the <code>loginauth</code> function, the overwritten return address is used, redirecting execution to attacker-controlled code.</li>
<li>The attacker-controlled code executes with elevated privileges, allowing the attacker to execute arbitrary commands on the device.</li>
<li>The attacker gains complete control of the device, potentially using it for malicious purposes such as botnet participation, data theft, or further network penetration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7719 allows a remote attacker to execute arbitrary code on the vulnerable Totolink WA300 device. This can lead to complete device compromise, allowing the attacker to steal sensitive information, use the device as a botnet node, or pivot to other devices on the network. Given the public availability of the exploit, widespread exploitation is possible, potentially affecting a large number of home and small business networks using the vulnerable device.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink WA300 HTTP Host Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually long <code>http_host</code> headers.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting CVE-2026-7719.</li>
<li>Upgrade to a patched version of the firmware or replace the affected device to remediate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>remote code execution</category><category>cve-2026-7719</category><category>totolink</category></item><item><title>Totolink WA300 Buffer Overflow Vulnerability in UploadCustomModule</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-wa300-buffer-overflow/</link><pubDate>Mon, 04 May 2026 01:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-wa300-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the UploadCustomModule function of the /cgi-bin/cstecgi.cgi file in the POST Request Handler component of Totolink WA300 version 5.2cu.7112_B20190227, which can be exploited by manipulating the File argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink WA300 wireless router, specifically version 5.2cu.7112_B20190227. The vulnerability resides within the <code>UploadCustomModule</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file, a component of the POST Request Handler. The identified vulnerability allows a remote attacker to cause a buffer overflow through manipulation of the <code>File</code> argument within a crafted POST request. Public proof-of-concept exploit code is available, increasing the likelihood of exploitation. This vulnerability poses a significant risk, as successful exploitation could lead to arbitrary code execution, potentially allowing attackers to fully compromise affected devices. Defenders should prioritize detection and mitigation strategies to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Totolink WA300 device running firmware version 5.2cu.7112_B20190227.</li>
<li>Attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The POST request includes a <code>File</code> argument with a payload exceeding the buffer size allocated for the <code>UploadCustomModule</code> function.</li>
<li>The <code>UploadCustomModule</code> function processes the POST request without proper bounds checking on the <code>File</code> argument.</li>
<li>The oversized <code>File</code> argument overwrites adjacent memory regions, including potentially critical program data and control flow instructions.</li>
<li>The buffer overflow allows the attacker to inject and execute arbitrary code on the device.</li>
<li>The attacker gains remote shell access to the device with elevated privileges.</li>
<li>The attacker could then use the compromised device to pivot into the internal network or cause a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the affected Totolink WA300 device. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the device as a bot in a larger attack. Given the high CVSS score of 8.8, the impact is considered critical. Home and small business networks using the affected router model are at risk. The vulnerability allows for remote code execution, leading to significant potential for damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink WA300 UploadCustomModule Buffer Overflow Attempt</code> to detect malicious POST requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually large <code>File</code> parameters, as indicated in the Sigma rule.</li>
<li>Apply any available firmware updates from Totolink to patch CVE-2026-7717 if they become available.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other internal network resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>remote-code-execution</category><category>router</category></item><item><title>Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach</title><link>https://feed.craftedsignal.io/briefs/2026-05-thunderbird-vulns/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-thunderbird-vulns/</guid><description>Multiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.</description><content:encoded><![CDATA[<p>On May 4, 2026, CERT-FR published an advisory regarding multiple vulnerabilities affecting Mozilla Thunderbird. Specifically, Thunderbird versions prior to 150.0.1 and Thunderbird ESR versions prior to 140.10.1 are vulnerable. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, compromise the confidentiality of data, and bypass security policies. The advisory highlights the urgency for users and organizations utilizing affected versions to apply the necessary patches to mitigate these risks. These vulnerabilities underscore the importance of maintaining up-to-date software versions to defend against potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target using a vulnerable version of Mozilla Thunderbird (ESR &lt; 140.10.1 or &lt; 150.0.1).</li>
<li>Attacker crafts a malicious email or leverages a compromised website to deliver a specially crafted exploit.</li>
<li>The user opens the malicious email or visits the compromised website within Thunderbird.</li>
<li>The exploit triggers a vulnerability in Thunderbird, such as CVE-2026-7320 (or another from the listed CVEs), leading to code execution.</li>
<li>Attacker gains initial access to the user&rsquo;s system with the privileges of the Thunderbird process.</li>
<li>Attacker escalates privileges, if necessary, to gain a higher level of control over the system.</li>
<li>Attacker executes arbitrary commands to install malware, exfiltrate sensitive data, or perform other malicious actions.</li>
<li>The attacker achieves their objective, such as data theft, system compromise, or establishing a persistent foothold.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have severe consequences. An attacker could remotely execute arbitrary code, potentially leading to full system compromise. Sensitive data stored within Thunderbird, such as emails, contacts, and passwords, could be exposed. The security policy bypass could allow attackers to perform actions that are normally restricted, further compromising the system&rsquo;s security. This can lead to significant financial losses, reputational damage, and legal liabilities for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Mozilla Thunderbird to version 150.0.1 or later, or Thunderbird ESR to version 140.10.1 or later, to patch the vulnerabilities described in Mozilla security advisories mfsa2026-38 and mfsa2026-39.</li>
<li>Deploy the Sigma rule &ldquo;Detect Thunderbird Spawning Suspicious Processes&rdquo; to identify potential exploitation attempts via unusual child processes.</li>
<li>Monitor process creation events for Thunderbird spawning command interpreters or script engines using the Sigma rule &ldquo;Detect Thunderbird Running External Commands&rdquo;.</li>
<li>Review and harden email security policies to prevent the delivery of malicious emails that could exploit these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>databreach</category><category>securitybypass</category></item><item><title>Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</link><pubDate>Sun, 03 May 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</guid><description>CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7698, has been identified in Tiandy Easy7 Integrated Management Platform version 7.17.0. This vulnerability resides within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> file, specifically related to the <code>week</code> argument. Successful exploitation allows for arbitrary OS command injection. This vulnerability is remotely exploitable, meaning an attacker can trigger it over the network without needing local access. Publicly available exploit code exists, increasing the likelihood of exploitation. The vendor was notified but has not responded. Defenders should take immediate action to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tiandy Easy7 Integrated Management Platform running version 7.17.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>The crafted request includes a payload within the <code>week</code> argument designed to inject OS commands.</li>
<li>The vulnerable application fails to properly sanitize or validate the <code>week</code> argument.</li>
<li>The application executes the injected OS command with the privileges of the web server.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform further actions such as installing malware, exfiltrating data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7698 allows an attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data breaches, denial of service, or further lateral movement within the network. Given the publicly available exploit, organizations using Tiandy Easy7 Integrated Management Platform 7.17.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tiandy if they become available.</li>
<li>Monitor web server logs for requests to <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> containing suspicious characters or command injection attempts. Deploy the Sigma rule <code>Detect Suspicious Requests to updateDbBackupInfo</code> to your SIEM.</li>
<li>Implement input validation and sanitization on the <code>week</code> argument within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>Monitor process creation events for unusual processes spawned by the web server, using the Sigma rule <code>Detect OS Command Injection via Web Request</code>.</li>
<li>Review and restrict network access to the Tiandy Easy7 Integrated Management Platform to only authorized users and systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7698</category><category>command-injection</category><category>web-application</category></item><item><title>Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, tracked as CVE-2026-7684, affects Edimax BR-6428nC devices up to version 1.16. The vulnerability resides in the <code>/goform/setWAN</code> file, specifically within the handling of the <code>pptpDfGateway</code> argument. An unauthenticated attacker can exploit this flaw remotely by sending a crafted request to the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond, suggesting that a patch is unlikely and highlighting the need for mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Edimax BR-6428nC device running a vulnerable firmware version (&lt;= 1.16).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>The request includes the <code>pptpDfGateway</code> parameter with a value exceeding the expected buffer size.</li>
<li>The device processes the request, and the oversized <code>pptpDfGateway</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow.</li>
<li>Execution is redirected to attacker-controlled code injected within the overflowed buffer.</li>
<li>The attacker gains arbitrary code execution on the device, potentially achieving full system control.</li>
<li>The attacker could then use this control to modify device settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow an attacker to gain complete control of the Edimax BR-6428nC device. This could enable the attacker to intercept and modify network traffic, access sensitive information, or use the device as a point of entry for further attacks within the network. Given the public availability of exploit code, the risk of widespread exploitation is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Edimax_BR_6428nC_Buffer_Overflow_setWAN</code> to detect suspicious HTTP requests targeting the vulnerable endpoint and parameter.</li>
<li>Consider blocking or rate-limiting access to the <code>/goform/setWAN</code> endpoint from untrusted networks.</li>
<li>Since the vendor is unresponsive and a patch is unlikely, network segmentation and access control policies are the best mitigation options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7684</category><category>webserver</category></item><item><title>Edimax BR-6208AC Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</guid><description>A buffer overflow vulnerability exists in Edimax BR-6208AC devices (&lt;= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-7685, has been identified in Edimax BR-6208AC routers up to version 1.02. The vulnerability resides within the <code>/goform/setWAN</code> file, specifically related to the <code>pptpDfGateway</code> argument. Successful exploitation of this flaw could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but has not responded. Given the ease of exploitation and the potential for significant impact, this vulnerability poses a critical threat to affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Edimax BR-6208AC router with firmware version 1.02 or earlier exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>pptpDfGateway</code> argument, injecting a payload exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s web server processes the malicious request without proper input validation on the size of the <code>pptpDfGateway</code> argument.</li>
<li>The oversized payload overwrites adjacent memory regions on the stack, potentially including return addresses or other critical data.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker, leading to arbitrary code execution.</li>
<li>The attacker executes commands to gain control of the device, potentially installing malware or modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Edimax BR-6208AC router. An attacker could leverage this access to perform a variety of malicious activities, including eavesdropping on network traffic, injecting malicious code into web pages served by the router, or using the router as a bot in a larger botnet. Given the availability of public exploits, unpatched devices are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Edimax BR-6208AC setWAN Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to <code>/goform/setWAN</code> containing unusually long <code>pptpDfGateway</code> parameters, as detected by the Sigma rule <code>Detect Long pptpDfGateway Parameter</code>.</li>
<li>Apply appropriate network segmentation to limit the blast radius of compromised devices and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7685</category><category>router</category><category>webserver</category></item><item><title>Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-buffer-overflow/</link><pubDate>Sun, 03 May 2026 03:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Shenzhen Libituo Technology LBT-T300-HW1 version 1.2.8 and earlier, allowing remote attackers to execute arbitrary code by manipulating the Channel/ApCliSsid argument in the start_lan function of the /apply.cgi file.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7675, affects Shenzhen Libituo Technology LBT-T300-HW1 devices with firmware versions up to 1.2.8. The vulnerability resides in the <code>start_lan</code> function within the <code>/apply.cgi</code> file. By manipulating the <code>Channel/ApCliSsid</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists for this vulnerability. The vendor was notified about the vulnerability, but there has been no response. This vulnerability is considered critical due to the potential for remote exploitation and the availability of exploit code.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Shenzhen Libituo Technology LBT-T300-HW1 device running firmware version 1.2.8 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/apply.cgi</code> endpoint.</li>
<li>The HTTP request includes a specially crafted <code>Channel/ApCliSsid</code> argument designed to overflow the buffer in the <code>start_lan</code> function.</li>
<li>The vulnerable <code>start_lan</code> function receives the malicious input and attempts to process it without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including potentially the return address on the stack.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address with the address of malicious code.</li>
<li>The injected code executes with the privileges of the web server process.</li>
<li>The attacker achieves arbitrary code execution, potentially gaining full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected device. Given that this is a router, this could lead to complete compromise of the device, including the ability to intercept and manipulate network traffic, install malware, or use the device as part of a botnet. Due to the public availability of the exploit, widespread exploitation is possible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply network intrusion detection system (NIDS) rules to detect and block malicious HTTP requests targeting <code>/apply.cgi</code> with excessively long <code>Channel/ApCliSsid</code> values.</li>
<li>Deploy the Sigma rule <code>Detect-LBT-T300-HW1-applycgi-buffer-overflow</code> to your SIEM and tune for your environment to identify exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/apply.cgi</code> and analyze the length of the <code>Channel/ApCliSsid</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer overflow</category><category>remote code execution</category><category>web application vulnerability</category></item><item><title>Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-bo/</link><pubDate>Sun, 03 May 2026 02:17:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-bo/</guid><description>A buffer overflow vulnerability (CVE-2026-7674) exists in the Web Management Interface of Shenzhen Libituo Technology LBT-T300-HW1 devices, allowing remote attackers to execute arbitrary code by manipulating the vpn_pptp_server or vpn_l2tp_server arguments in the start_single_service function.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7674, affects Shenzhen Libituo Technology LBT-T300-HW1 devices up to version 1.2.8. The vulnerability resides within the Web Management Interface, specifically in the <code>start_single_service</code> function. By sending a crafted request to the device and manipulating the <code>vpn_pptp_server</code> or <code>vpn_l2tp_server</code> arguments, an attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability can be exploited remotely, making it a significant threat to affected devices. The vendor was notified but did not respond, increasing the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable LBT-T300-HW1 device with version 1.2.8 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the Web Management Interface.</li>
<li>The malicious request includes a payload designed to overflow the buffer when processing the <code>vpn_pptp_server</code> or <code>vpn_l2tp_server</code> arguments.</li>
<li>The crafted request is sent to the <code>start_single_service</code> function.</li>
<li>The <code>start_single_service</code> function attempts to process the overly long input without proper bounds checking.</li>
<li>The buffer overflow overwrites adjacent memory regions, including potentially executable code or critical data structures.</li>
<li>The attacker gains control of the device by redirecting execution flow to attacker-controlled code injected into the buffer.</li>
<li>The attacker executes arbitrary code on the device, potentially gaining persistent access or causing denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected LBT-T300-HW1 device. This could lead to complete system compromise, including data theft, modification of device settings, or use of the device as a bot in a larger attack. Given the lack of vendor response, many devices could be vulnerable if exposed to the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious VPN Server Configuration via Web Interface</code> to detect potential exploitation attempts targeting the vulnerable <code>start_single_service</code> function in web server logs.</li>
<li>Monitor network traffic for unusually long strings passed as values for <code>vpn_pptp_server</code> and <code>vpn_l2tp_server</code> parameters in HTTP requests to the device&rsquo;s web interface.</li>
<li>Apply any available patches or firmware updates released by Shenzhen Libituo Technology to address CVE-2026-7674.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>web-management-interface</category><category>cve-2026-7674</category></item><item><title>OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)</title><link>https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</link><pubDate>Sat, 02 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</guid><description>A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, CVE-2026-7590, has been identified in the Preview Endpoint of eyal-gor&rsquo;s p_69_branch_monkey_mcp. This vulnerability affects versions up to commit 69bc71874ce40050ef45fde5a435855f18af3373. A remote attacker can exploit this flaw by manipulating the <code>dev_script</code> argument within the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.  Successful exploitation allows for arbitrary command execution on the host operating system. The exploit is publicly available, increasing the risk of widespread exploitation. The vendor has been notified but has not yet responded. The lack of versioning makes it difficult to determine the exact scope of affected installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of p_69_branch_monkey_mcp running a web server.</li>
<li>The attacker crafts a malicious HTTP request targeting the Preview Endpoint.</li>
<li>The request includes a payload in the <code>dev_script</code> argument designed to inject OS commands via the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.</li>
<li>The web server processes the request, passing the attacker-controlled <code>dev_script</code> argument to a function that executes system commands without proper sanitization.</li>
<li>The injected OS command is executed by the server, potentially with the privileges of the web server user. For example, an attacker could inject <code>ls -la</code> to list directory contents.</li>
<li>The output of the injected command is returned to the attacker via the web server&rsquo;s response, confirming successful command execution.</li>
<li>The attacker leverages the initial command execution to escalate privileges, install persistent backdoors, or move laterally within the network, depending on the server&rsquo;s configuration and accessible resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7590 allows a remote attacker to execute arbitrary OS commands on the affected server. This could lead to complete system compromise, including data theft, malware installation, and denial of service. The lack of version information makes it difficult to ascertain the number of vulnerable installations, but given the publicly available exploit, widespread exploitation is possible. Organizations using p_69_branch_monkey_mcp are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the Preview Endpoint and containing potentially malicious payloads in the <code>dev_script</code> parameter as described in the attack chain. Use the &ldquo;p_69_branch_monkey_mcp_command_injection&rdquo; Sigma rule.</li>
<li>Inspect process creation events for unexpected processes spawned by the web server, indicating potential command injection. Use the &ldquo;p_69_branch_monkey_mcp_unexpected_process&rdquo; Sigma rule.</li>
<li>Implement input validation and sanitization on the <code>dev_script</code> parameter in the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file to prevent command injection.</li>
<li>Although specific vulnerable versions are unavailable, immediately investigate and patch any instances of <code>p_69_branch_monkey_mcp</code> due to the public exploit availability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>web-application</category><category>cve</category></item><item><title>WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</link><pubDate>Sat, 02 May 2026 08:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-widget-rce/</guid><description>The Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.</description><content:encoded><![CDATA[<p>The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets plugin, versions 4.2.2 and earlier, contains a Remote Code Execution (RCE) vulnerability (CVE-2026-2052). This flaw stems from the plugin&rsquo;s Display Logic feature, which utilizes the <code>eval()</code> function to process user-supplied expressions. The plugin&rsquo;s implemented blocklist/allowlist is insufficient, making it bypassable through techniques involving <code>array_map</code> with string concatenation. Furthermore, the plugin lacks proper authorization enforcement on the <code>extended_widget_opts_block</code> attribute. This vulnerability allows authenticated attackers with Contributor-level access or higher to inject and execute arbitrary code on the underlying server. The vendor partially addressed this vulnerability in version 4.2.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress application as a Contributor or higher-level user.</li>
<li>The attacker navigates to the Widget Options settings within the WordPress admin panel.</li>
<li>The attacker crafts a malicious Display Logic expression designed to execute arbitrary PHP code. This involves bypassing the blocklist/allowlist using techniques such as <code>array_map</code> and string concatenation.</li>
<li>The attacker injects the malicious Display Logic expression into the <code>extended_widget_opts_block</code> attribute.</li>
<li>The WordPress application processes the widget options, including the malicious Display Logic expression. Due to the lack of proper sanitization and authorization, the <code>eval()</code> function executes the attacker-supplied PHP code.</li>
<li>The attacker&rsquo;s code executes with the permissions of the web server user, potentially allowing the attacker to read or write files, execute system commands, or compromise the entire server.</li>
<li>The attacker may establish persistence by writing a backdoor to a file on the server or by creating a new administrator account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2052 allows an attacker to execute arbitrary code on the WordPress server. This can lead to complete compromise of the website, including data theft, defacement, and the installation of malware. Since the vulnerability requires Contributor access or higher, the impact is significant if such accounts are compromised through other means (e.g., phishing, credential stuffing). The lack of proper input sanitization and authorization makes this a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the &ldquo;The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks &amp; Classic Widgets&rdquo; plugin to the latest version to patch CVE-2026-2052.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Widget Options RCE Attempt&rdquo; to your SIEM to detect exploitation attempts.</li>
<li>Review user roles and permissions to minimize the number of users with Contributor or higher-level access.</li>
<li>Monitor web server logs for unusual activity, particularly requests to <code>/wp-admin/options.php</code> related to widget options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category></item><item><title>WordPress User Verification Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</link><pubDate>Sat, 02 May 2026 05:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-auth-bypass/</guid><description>The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.</description><content:encoded><![CDATA[<p>The User Verification by PickPlugins plugin, a popular WordPress plugin, contains a critical authentication bypass vulnerability (CVE-2026-7458) affecting all versions up to and including 2.0.46. The flaw resides within the <code>user_verification_form_wrap_process_otpLogin</code> function, where a loose PHP comparison operator is used to validate OTP codes. This weakness allows unauthenticated attackers to bypass the OTP verification process and log in as any user with a verified email address, potentially gaining administrative access. Successful exploitation requires the attacker to submit the string &ldquo;true&rdquo; as the OTP value. This vulnerability poses a significant risk to WordPress sites using the affected plugin, potentially leading to complete site compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version of the User Verification by PickPlugins plugin (&lt;= 2.0.46).</li>
<li>The attacker navigates to the OTP login form provided by the plugin.</li>
<li>The attacker enters the email address of a target user, such as an administrator.</li>
<li>The attacker intercepts the OTP request and instead of a numerical code, submits the string &ldquo;true&rdquo; as the OTP value.</li>
<li>The vulnerable <code>user_verification_form_wrap_process_otpLogin</code> function processes the submitted OTP. Due to the loose PHP comparison (e.g., <code>==</code> instead of <code>===</code>), the string &ldquo;true&rdquo; evaluates to <code>true</code>, bypassing the intended OTP validation.</li>
<li>The plugin incorrectly authenticates the attacker as the targeted user.</li>
<li>The attacker gains unauthorized access to the targeted user&rsquo;s account, potentially gaining administrative privileges.</li>
<li>The attacker can now perform actions such as modifying website content, installing malicious plugins, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7458 allows unauthenticated attackers to bypass the OTP verification mechanism and gain unauthorized access to any user account with a verified email address on a vulnerable WordPress site. This can lead to complete compromise of the affected WordPress site, enabling attackers to modify content, inject malicious code, steal sensitive data, or use the site for malicious purposes. Given the plugin&rsquo;s popularity, this vulnerability could impact a large number of WordPress websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Verification by PickPlugins plugin to the latest version (greater than 2.0.46) to patch CVE-2026-7458.</li>
<li>Monitor WordPress access logs for unusual login attempts or the presence of &ldquo;true&rdquo; as OTP values to identify potential exploitation attempts. Deploy the <code>Detect Successful Authentication Bypass via True OTP</code> Sigma rule.</li>
<li>Implement stricter input validation and sanitization for OTP codes to prevent similar bypass vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>wordpress</category><category>authentication bypass</category><category>cve-2026-7458</category></item><item><title>WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</link><pubDate>Sat, 02 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-upload/</guid><description>The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The User Registration Advanced Fields plugin for WordPress, specifically versions up to and including 1.6.20, contains an arbitrary file upload vulnerability (CVE-2026-4882) due to insufficient file type validation in the <code>URAF_AJAX::method_upload</code> function. This flaw enables unauthenticated attackers to upload any file type to the affected server, which can lead to remote code execution if the uploaded file is strategically placed and executed. The vulnerability is exploitable only if a &ldquo;Profile Picture&rdquo; field is active within the registration form. This poses a significant threat to websites using the plugin, as attackers can potentially gain full control of the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable User Registration Advanced Fields plugin (&lt;= 1.6.20) with the &ldquo;Profile Picture&rdquo; field enabled.</li>
<li>The attacker crafts a malicious HTTP request to the <code>URAF_AJAX::method_upload</code> function, bypassing any client-side file type checks.</li>
<li>The attacker uploads a web shell (e.g., a PHP file) disguised as a legitimate file type or without any extension to evade basic detection mechanisms.</li>
<li>The vulnerable plugin saves the file to the WordPress uploads directory without proper validation.</li>
<li>The attacker identifies the exact file path of the uploaded web shell on the server.</li>
<li>The attacker sends another HTTP request directly to the uploaded web shell.</li>
<li>The web shell executes on the server, providing the attacker with remote code execution capabilities.</li>
<li>The attacker can then leverage the web shell to perform various malicious activities, such as installing malware, defacing the website, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-4882) allows unauthenticated attackers to upload arbitrary files to a vulnerable WordPress website, potentially leading to remote code execution. This can result in complete compromise of the affected website, including data theft, website defacement, and malware infections. The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical severity level. The impact includes potential damage to reputation, financial losses, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the User Registration Advanced Fields plugin to the latest version (greater than 1.6.20) to patch CVE-2026-4882.</li>
<li>Implement file type validation on the server-side, restricting allowed file extensions for profile picture uploads.</li>
<li>Monitor web server logs for suspicious file upload activity targeting the <code>URAF_AJAX::method_upload</code> function to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious WordPress File Uploads</code> to your SIEM.</li>
<li>Implement strict file permission policies to prevent uploaded files from being executed as scripts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-upload</category><category>rce</category></item><item><title>CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</link><pubDate>Sat, 02 May 2026 03:06:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</guid><description>The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.</description><content:encoded><![CDATA[<p>CVE-2026-31431, known as &ldquo;Copy Fail,&rdquo; is a high-severity local privilege escalation vulnerability affecting the Linux kernel&rsquo;s cryptographic subsystem. The vulnerability resides within the algif_aead module of the AF_ALG (userspace crypto API) and results from improper memory handling during in-place operations. An unprivileged user can exploit this flaw to corrupt the cache of readable files, including setuid binaries, resulting in unauthorized root privilege escalation. This vulnerability impacts a wide range of Linux distributions, including Ubuntu 24.04 LTS, Amazon Linux 2023, Red Hat Enterprise Linux (RHEL 10.1), and SUSE 16, as well as other distributions like Debian, Fedora, and Arch Linux. The availability of a working proof-of-concept exploit has raised concerns about potential widespread exploitation, leading to its addition to the CISA KEV catalog.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> The attacker gains limited visibility into the environment (e.g., compromised CI runner, web container) and identifies the kernel version. Kernel version information is obtained without elevated privileges.</li>
<li><strong>Script Execution:</strong> The attacker executes a compact Python script that interacts with standard kernel interfaces, without relying on networking, compilation, or third-party libraries.</li>
<li><strong>AF_ALG Abuse:</strong> The script abuses an interaction between the AF_ALG (asynchronous crypto) socket interface, the splice() system call and improper error handling during a failed copy operation.</li>
<li><strong>Kernel Page Cache Corruption:</strong> This interaction leads to a controlled 4-byte overwrite in the kernel page cache, corrupting sensitive kernel-managed data.</li>
<li><strong>Privilege Escalation:</strong> By corrupting kernel structures associated with credentials or execution context, the attacker escalates their process to UID 0.</li>
<li><strong>Boundary Breach:</strong> The system&rsquo;s privilege boundary is broken, neutralizing SELinux/AppArmor protections, and bypassing local security controls.</li>
<li><strong>Lateral Movement/Container Escape:</strong> The attacker can now use the root privileges gained to perform lateral movement or escape the container.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to full root privilege escalation, resulting in high impact to confidentiality, integrity, and availability. This could facilitate container breakout, multi-tenant compromise, and lateral movement within shared environments. The vulnerability&rsquo;s reliability, stealth (in-memory-only modification), and cross-platform applicability make it particularly dangerous in cloud, CI/CD, and Kubernetes environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all instances of affected products and versions in your environment and prioritize patching (CVE-2026-31431).</li>
<li>Deploy the Sigma rule for suspicious process execution under /tmp, often used in exploit PoCs, and tune for your environment.</li>
<li>Monitor for suspicious AF_ALG socket creation events, as indicated in the Attack Chain, using the provided Sigma rule.</li>
<li>If patches are unavailable, consider implementing network isolation and access controls as interim mitigation measures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>kernel</category></item><item><title>WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</link><pubDate>Fri, 01 May 2026 10:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</guid><description>The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.</description><content:encoded><![CDATA[<p>CVE-2026-7567 is an authentication bypass vulnerability that affects the Temporary Login plugin for WordPress, specifically versions up to and including 1.0.0. The vulnerability stems from a failure to properly validate the &rsquo;temp-login-token&rsquo; GET parameter within the <code>maybe_login_temporary_user()</code> function. By supplying an array as the value for this parameter, attackers can circumvent the intended <code>empty()</code> check. This leads to the <code>sanitize_key()</code> function returning an empty string, which is then used in a database query to fetch users. WordPress ignores empty <code>meta_value</code> parameters, causing the query to return all users with the <code>_temporary_login_token</code> meta key. Consequently, an unauthenticated attacker can effectively authenticate as any user with an active temporary login session by sending a single, maliciously crafted GET request. This poses a severe risk to website security, as it allows unauthorized access to user accounts and potentially sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Temporary Login plugin (version &lt;= 1.0.0).</li>
<li>The attacker crafts a malicious GET request targeting the WordPress site&rsquo;s login endpoint, including the &rsquo;temp-login-token&rsquo; parameter as an array (e.g., <code>temp-login-token[]=</code>).</li>
<li>The web server receives the GET request.</li>
<li>The <code>maybe_login_temporary_user()</code> function processes the request.</li>
<li>Due to improper input validation, the <code>empty()</code> check is bypassed when the &rsquo;temp-login-token&rsquo; parameter is an array.</li>
<li><code>sanitize_key()</code> processes the array and returns an empty string as the meta_value.</li>
<li>WordPress executes a database query using the empty meta_value, effectively retrieving all users with active temporary login tokens.</li>
<li>The attacker is granted unauthorized access to the account of a targeted temporary user, bypassing normal authentication procedures.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7567 allows unauthenticated attackers to bypass login restrictions and gain unauthorized access to WordPress user accounts utilizing the vulnerable Temporary Login plugin. The severity is high, as it allows complete compromise of user accounts without requiring any valid credentials. The impact includes potential data theft, account takeover, website defacement, and other malicious activities, depending on the privileges of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch or upgrade the Temporary Login plugin to a version greater than 1.0.0 to remediate CVE-2026-7567.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Temporary Login Authentication Bypass Attempt</code> to detect exploitation attempts by monitoring HTTP requests with array-based <code>temp-login-token</code> parameters in the query string.</li>
<li>Implement input validation on the web server to reject requests containing array-based parameters where scalar strings are expected.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress</category><category>plugin vulnerability</category><category>cve-2026-7567</category><category>cloud</category></item><item><title>Totolink NR1800X Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-7546, affects Totolink NR1800X routers running firmware version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>find_host_ip</code> function of the lighttpd web server component. By exploiting this flaw, a remote, unauthenticated attacker can trigger a stack-based buffer overflow through manipulation of the Host argument in an HTTP request. The publicly disclosed exploit allows attackers to potentially gain complete control of the device. This vulnerability poses a significant risk to home and small business networks utilizing the affected Totolink router model, as successful exploitation leads to arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X router running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker crafts a malicious HTTP request targeting the router&rsquo;s web interface.</li>
<li>The crafted request includes a <code>Host</code> header with a string exceeding the buffer size allocated in the <code>find_host_ip</code> function within the <code>lighttpd</code> component.</li>
<li>The router&rsquo;s <code>lighttpd</code> server processes the HTTP request and passes the <code>Host</code> header value to the vulnerable function.</li>
<li>The <code>find_host_ip</code> function attempts to store the oversized <code>Host</code> value in a stack-allocated buffer.</li>
<li>A stack-based buffer overflow occurs due to the insufficient buffer size.</li>
<li>The overflow overwrites adjacent memory on the stack, potentially including the return address.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7546 allows a remote attacker to execute arbitrary code on the vulnerable Totolink NR1800X device. This can lead to complete control of the router, allowing the attacker to modify router settings, intercept network traffic, or use the compromised router as a pivot point for further attacks within the network. Given the nature of stack-based buffer overflows, the attacker can potentially install persistent backdoors or malware. This presents a significant risk to users, potentially exposing sensitive data and infrastructure to unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches released by Totolink to remediate CVE-2026-7546.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting Totolink routers, specifically looking for abnormally long Host headers with the Sigma rule &ldquo;Detect Suspiciously Long Host Header&rdquo;.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Review and harden router configurations, including disabling remote administration if not required.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>remote code execution</category><category>buffer overflow</category><category>router</category></item><item><title>Totolink NR1800X Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</guid><description>A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7548, affects Totolink NR1800X router version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>sub_41A68C</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>setUssd</code> argument, a remote attacker can inject arbitrary commands into the system. Publicly available exploit code makes exploitation easier. This vulnerability poses a significant risk as it allows unauthenticated remote attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X device running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>setUssd</code> argument with a malicious payload designed to inject a command.</li>
<li>The <code>sub_41A68C</code> function processes the <code>setUssd</code> argument without proper sanitization.</li>
<li>The injected command is executed by the system with the privileges of the web server process.</li>
<li>The attacker gains initial access and can execute arbitrary commands on the device.</li>
<li>The attacker may then use the command execution to escalate privileges, install malware, or pivot to other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected Totolink NR1800X router. This could lead to complete compromise of the device, allowing the attacker to control network traffic, modify router settings, or use the router as a pivot point to attack other devices on the network. Given the wide usage of Totolink routers, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command injection attempts in the <code>setUssd</code> parameter, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/cgi-bin/cstecgi.cgi</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches provided by Totolink to address the CVE-2026-7548 vulnerability.</li>
<li>Deploy the Sigma rule to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>network</category></item><item><title>CVE-2026-7339: Heap Buffer Overflow in WebRTC</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-webrtc-overflow/</guid><description>A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7339 is a critical heap buffer overflow vulnerability affecting the WebRTC (Web Real-Time Communication) component in Google Chrome and Microsoft Edge (Chromium-based). This vulnerability stems from improper memory management within WebRTC, potentially allowing a remote attacker to execute arbitrary code by crafting malicious web content. As Microsoft Edge ingests Chromium, it is also vulnerable. Users of Chrome and Edge are affected. Defenders should apply available patches promptly to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious website designed to trigger the WebRTC vulnerability.</li>
<li>The victim visits the malicious website using a vulnerable version of Chrome or Edge.</li>
<li>The website uses JavaScript to initiate a WebRTC session.</li>
<li>The crafted WebRTC data triggers a heap buffer overflow during memory allocation within the WebRTC component.</li>
<li>The overflow overwrites adjacent memory regions on the heap.</li>
<li>The attacker carefully crafts the overflow data to overwrite critical program data or function pointers.</li>
<li>The corrupted data leads to arbitrary code execution within the context of the browser process.</li>
<li>The attacker gains control of the user&rsquo;s browser and potentially the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7339 can lead to arbitrary code execution, allowing an attacker to potentially install malware, steal sensitive information, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability could impact a large number of users across various sectors, including individuals, businesses, and government organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge (Chromium-based) to patch CVE-2026-7339.</li>
<li>Deploy the Sigma rule &ldquo;Detect WebRTC Heap Overflow Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-7339.</li>
<li>Monitor web server logs for unusual requests or patterns associated with WebRTC usage that could indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>webrtc</category><category>heap-overflow</category><category>code-execution</category><category>cve-2026-7339</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-use-after-free/</guid><description>CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7357 is a critical use-after-free vulnerability residing within the GPU component of the Chromium rendering engine. This flaw directly impacts Google Chrome and, due to Microsoft Edge&rsquo;s reliance on Chromium, also affects Edge users. A remote attacker could potentially exploit this vulnerability to execute arbitrary code on a targeted system. The vulnerability stems from improper memory management within the GPU processing routines. While the specific exploitation details are not provided in this brief, successful exploitation generally involves crafting malicious web content to trigger the vulnerability during GPU operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that triggers specific GPU functions.</li>
<li>User visits the malicious website using Chrome or Edge.</li>
<li>The browser&rsquo;s rendering engine processes the malicious JavaScript, leading to the allocation and subsequent freeing of a memory region in the GPU component.</li>
<li>The attacker&rsquo;s JavaScript code then attempts to access the previously freed memory region, triggering the use-after-free vulnerability.</li>
<li>By manipulating the memory layout, the attacker can overwrite the freed memory with controlled data.</li>
<li>The overwritten memory is later accessed by the GPU, leading to the execution of attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution within the context of the browser process.</li>
<li>The attacker leverages the code execution to escalate privileges or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7357 can lead to arbitrary code execution on the victim&rsquo;s machine. The attacker could potentially install malware, steal sensitive data, or take control of the affected system. Given the widespread use of Chrome and Edge, this vulnerability poses a significant risk to a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7357.</li>
<li>Apply the latest security updates for Microsoft Edge to address CVE-2026-7357.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WebAssembly Execution&rdquo; to identify potential exploitation attempts involving WebAssembly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chromium</category><category>edge</category><category>chrome</category></item><item><title>Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chromium-use-after-free/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chromium-use-after-free/</guid><description>CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7333 is a critical use-after-free vulnerability residing in the GPU component of the Chromium browser engine. This flaw allows an attacker to potentially corrupt memory and execute arbitrary code in the context of the browser process. As Microsoft Edge is built upon the Chromium engine, it is also susceptible to this vulnerability. Public details are limited, but exploitation likely involves crafting malicious web content that triggers the use-after-free condition within the GPU processing routines. This vulnerability poses a significant threat as it could allow attackers to compromise user systems simply by visiting a malicious website.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious HTML page containing JavaScript that interacts with the GPU functionality of the browser.</li>
<li>The user visits the malicious page via a phishing email or drive-by download.</li>
<li>The JavaScript code triggers the use-after-free vulnerability in the Chromium GPU component.</li>
<li>The vulnerability allows the attacker to corrupt memory allocated for GPU processing.</li>
<li>The attacker manipulates memory to gain control of program execution.</li>
<li>The attacker injects malicious code into the browser process.</li>
<li>The injected code executes with the privileges of the browser process, allowing the attacker to perform actions such as stealing cookies, credentials, or installing malware.</li>
<li>The attacker gains persistent access to the compromised system and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-7333 could allow an attacker to execute arbitrary code on a user&rsquo;s system. This could lead to the theft of sensitive information, installation of malware, or complete system compromise. Given the widespread use of Chromium-based browsers such as Chrome and Edge, this vulnerability has the potential to affect millions of users. The impact is considered critical due to the ease of exploitation and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7333.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious GPU Process Creation&rdquo; to identify potential exploitation attempts.</li>
<li>Enable process creation logging with command-line arguments to detect suspicious processes spawned by the browser (logsource: process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>use-after-free</category><category>chromium</category><category>gpu</category><category>cve-2026-7333</category><category>remote code execution</category></item><item><title>Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7348/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7348/</guid><description>CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7348 is a critical use-after-free vulnerability residing within the Codecs component of the Chromium browser engine. This vulnerability affects applications that utilize the Chromium engine, most notably Google Chrome and Microsoft Edge. While the specific details of the vulnerability are documented in Google Chrome Releases, the underlying issue stems from improper memory management within the Codecs library. Successful exploitation could allow an attacker to execute arbitrary code within the context of the affected browser, potentially leading to data theft, system compromise, or other malicious activities. This vulnerability requires immediate attention from organizations utilizing Chrome or Edge.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page containing specially crafted media content designed to trigger the use-after-free condition in the Codecs library.</li>
<li>The user visits the malicious web page using Google Chrome or Microsoft Edge.</li>
<li>The browser attempts to process the malicious media content, triggering the vulnerable code path within the Codecs library.</li>
<li>The use-after-free condition is triggered when the browser attempts to access memory that has already been freed.</li>
<li>The attacker leverages the use-after-free condition to corrupt memory and gain control of program execution.</li>
<li>The attacker injects and executes arbitrary code within the context of the browser process.</li>
<li>The attacker gains unauthorized access to sensitive data, such as cookies, credentials, or browsing history.</li>
<li>The attacker potentially escalates privileges or installs malware on the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7348 allows an attacker to execute arbitrary code within the context of the affected browser (Chrome or Edge). This can lead to sensitive information disclosure, such as credentials or browsing history. The attacker could potentially gain full control of the user&rsquo;s system. Given the widespread use of Chromium-based browsers, a successful exploit could impact a significant number of users across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Google Chrome to the latest version that addresses this vulnerability; refer to <a href="https://chromereleases.googleblog.com/2025">Google Chrome Releases</a>.</li>
<li>Ensure Microsoft Edge is updated to the latest version incorporating the Chromium security patch.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chromium Codecs Use-After-Free Exploit Attempt&rdquo; to identify potential exploitation attempts via webserver logs.</li>
<li>Enable webserver logging to capture HTTP requests, which is required for the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>vulnerability</category><category>browser</category></item><item><title>Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)</title><link>https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chromium-cve-2026-7338/</guid><description>CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-7338 is a critical use-after-free vulnerability residing within the Cast component of the Chromium browser engine. Google Chrome and Microsoft Edge (Chromium-based) are both affected by this flaw. While the provided source does not specify the exact vulnerable versions, it indicates that Microsoft Edge ingests Chromium, and thus is affected by vulnerabilities addressed in Chromium releases. Successful exploitation of this vulnerability could lead to arbitrary code execution in the context of the user running the browser. This poses a significant risk, as attackers could potentially gain control of the user&rsquo;s system. Defenders should prioritize patching affected browsers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious webpage or injects malicious code into a legitimate website that utilizes the Cast functionality.</li>
<li>The victim visits the malicious website or interacts with the compromised legitimate website using an affected browser (Chrome or Edge).</li>
<li>The malicious webpage triggers the use-after-free vulnerability in the Cast component.</li>
<li>The vulnerability allows the attacker to access memory that has already been freed.</li>
<li>The attacker overwrites the freed memory with attacker-controlled data.</li>
<li>The attacker manipulates the memory layout to redirect program execution.</li>
<li>The browser attempts to execute code from the attacker-controlled memory location.</li>
<li>This results in arbitrary code execution within the context of the browser process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7338 allows an attacker to execute arbitrary code on a victim&rsquo;s machine. This can lead to complete system compromise, data theft, installation of malware, or other malicious activities. Given the widespread use of Chromium-based browsers like Chrome and Edge, this vulnerability has the potential to impact a large number of users across various sectors. The severity is critical due to the potential for remote code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome to address CVE-2026-7338 as detailed in Google Chrome Releases.</li>
<li>Apply the latest security updates for Microsoft Edge (Chromium-based) to address CVE-2026-7338, ensuring the ingested Chromium version contains the fix.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting the Cast component.</li>
<li>Enable enhanced browser security features, such as sandboxing and site isolation, to limit the impact of potential exploits.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>chrome</category><category>edge</category><category>cve-2026-7338</category><category>remote code execution</category></item><item><title>Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)</title><link>https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</link><pubDate>Fri, 01 May 2026 02:21:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chromium-heap-overflow/</guid><description>CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.</description><content:encoded><![CDATA[<p>CVE-2026-7353 is a critical heap buffer overflow vulnerability residing within the Skia graphics library, a core component of the Chromium open-source project. This vulnerability impacts applications that utilize Chromium, including Google Chrome and Microsoft Edge. While the specific details of exploitation are not provided in this brief, the nature of a heap buffer overflow suggests a high potential for arbitrary code execution. Successful exploitation could allow an attacker to gain control of the affected browser process. Given the widespread use of Chromium-based browsers, this vulnerability poses a significant risk to a large user base. Defenders should prioritize patching and consider implementing mitigations to detect and prevent potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious web page or injects malicious content into a trusted website.</li>
<li>The victim visits the malicious web page or interacts with the injected content using a Chromium-based browser (Chrome or Edge).</li>
<li>The browser&rsquo;s rendering engine, utilizing the Skia library, processes the malicious content, triggering the heap buffer overflow in Skia.</li>
<li>The overflow allows the attacker to overwrite adjacent memory regions in the heap.</li>
<li>By carefully crafting the overflowed data, the attacker can overwrite critical data structures within the browser process.</li>
<li>The attacker gains control of the execution flow by overwriting function pointers or other control data.</li>
<li>The attacker executes arbitrary code within the context of the browser process.</li>
<li>The attacker could then perform actions such as installing malware, stealing sensitive data, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7353 allows for arbitrary code execution within the context of the affected browser process. This can lead to a complete compromise of the user&rsquo;s browser session, potentially enabling the attacker to steal credentials, inject malicious code into other websites, or install malware on the victim&rsquo;s system. Given the widespread use of Chrome and Edge, the potential impact is significant, affecting potentially millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security updates for Google Chrome and Microsoft Edge to patch CVE-2026-7353.</li>
<li>Deploy the following Sigma rule to detect potential exploitation attempts based on suspicious process execution originating from the browser (see &ldquo;Detect Suspicious Process Creation from Browser&rdquo;).</li>
<li>Enable enhanced browser security features such as site isolation to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap overflow</category><category>chromium</category><category>cve-2026-7353</category></item><item><title>Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</link><pubDate>Fri, 01 May 2026 00:45:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pytorch-lightning-compromise/</guid><description>Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.</description><content:encoded><![CDATA[<p>On April 30, 2026, two malicious versions (2.6.2 and 2.6.3) of the widely used <code>pytorch-lightning</code> package were published to the PyPI registry after the publisher account was compromised. These versions contain embedded malicious code designed to steal developer credentials and republish infected versions of repositories to which the stolen tokens have access. The attack is triggered upon importing the package, initiating a background process that silently harvests credentials from a wide array of services, including AWS, Azure, Google Cloud, and GitHub, as well as local environment variables and credential files. Version 2.6.3 was published just 13 minutes after 2.6.2, and was intended to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the publisher account for the <code>pytorch-lightning</code> package on PyPI.</li>
<li>Attacker publishes malicious versions 2.6.2 and 2.6.3 to PyPI.</li>
<li>A modified <code>__init__.py</code> file within the package initiates a background process upon import.</li>
<li>The background process executes silently, without any visible output or indication of compromise to the user.</li>
<li>The malicious package downloads a runtime (Bun) from GitHub.</li>
<li>The package executes a large, obfuscated JavaScript file, targeting AWS, Azure, Google Cloud, GitHub, and local credential stores.</li>
<li>Stolen credentials, including cloud provider keys, API tokens, and secrets, are exfiltrated to attacker-controlled infrastructure.</li>
<li>The malware attempts to download and execute a second-stage payload from attacker-controlled infrastructure, expanding the scope of the attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Organizations that downloaded and used versions 2.6.2 or 2.6.3 of the <code>pytorch-lightning</code> package are at high risk of compromise. The malicious package is designed to steal a wide range of credentials, including cloud provider keys, API tokens, and secrets stored in environment variables. This can lead to unauthorized access to sensitive data and systems, potentially resulting in data breaches, financial losses, and reputational damage. The malware&rsquo;s ability to download and execute secondary payloads further increases the potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately remove versions 2.6.2 and 2.6.3 of the <code>lightning</code> package from all systems where they are installed (see overview).</li>
<li>Audit systems for unauthorized processes and review outbound network connections to detect potential compromises (see overview).</li>
<li>Rotate all cloud provider keys (AWS, Azure, GCP), API tokens (GitHub, CI/CD systems), and secrets stored in environment variables to prevent further unauthorized access (see Attack Chain).</li>
<li>Implement the <code>Detect Suspicious PyPI Package Installation</code> Sigma rule to identify potential malicious packages being installed in the future (see rules).</li>
<li>Implement the <code>Detect Credential Harvesting via Bun</code> Sigma rule to catch execution of the malicious JavaScript payload (see rules).</li>
<li>Pin dependencies to known-good versions and verify package integrity before use to prevent future supply chain attacks (see references).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>malware</category></item><item><title>UTT HiPER 1200GW Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</link><pubDate>Fri, 01 May 2026 00:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in UTT HiPER 1200GW devices up to version 2.5.3-170306, stemming from manipulation of the `strcpy` function in the `/goform/formRemoteControl` file, which allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in UTT HiPER 1200GW devices with firmware versions up to 2.5.3-170306. The flaw resides within the <code>strcpy</code> function of the <code>/goform/formRemoteControl</code> file, which handles remote control functionalities. A remote attacker can exploit this vulnerability by sending a specially crafted request to trigger the buffer overflow, potentially leading to arbitrary code execution on the affected device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations using the affected UTT HiPER 1200GW devices, as it could allow attackers to gain unauthorized access and control over the device and potentially the network it is connected to.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable UTT HiPER 1200GW device exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/goform/formRemoteControl</code> endpoint.</li>
<li>The malicious request includes a payload designed to overflow the buffer when processed by the <code>strcpy</code> function.</li>
<li>The vulnerable <code>strcpy</code> function within <code>/goform/formRemoteControl</code> copies the attacker-controlled data without proper bounds checking.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker leverages the overflow to inject and execute arbitrary code on the device.</li>
<li>The attacker gains control of the device, potentially escalating privileges.</li>
<li>The attacker uses the compromised device to pivot to other systems on the network, exfiltrate sensitive data, or cause further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to complete compromise of the affected UTT HiPER 1200GW device. Attackers could gain unauthorized access to sensitive data, disrupt device functionality, or use the device as a foothold for further attacks within the network. Given that public exploits are available, the risk of widespread exploitation is high. While the exact number of affected devices is unknown, organizations using UTT HiPER 1200GW devices should take immediate action to mitigate this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from UTT to address the buffer overflow vulnerability in UTT HiPER 1200GW devices.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/goform/formRemoteControl</code> endpoint, and deploy the Sigma rule <code>Detect Suspicious Requests to FormRemoteControl</code> to identify potentially malicious activity.</li>
<li>Implement input validation and sanitization measures to prevent buffer overflows in web applications.</li>
<li>Consider network segmentation to limit the impact of a compromised device on other systems within the network.</li>
<li>Review and restrict access to the device&rsquo;s web interface to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve</category></item><item><title>HKUDS OpenHarness Remote Code Execution via /bridge Slash Command (CVE-2026-7551)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openharness-rce/</link><pubDate>Thu, 30 Apr 2026 22:17:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openharness-rce/</guid><description>HKUDS OpenHarness contains a remote code execution vulnerability (CVE-2026-7551) in the /bridge slash command, allowing remote attackers to execute arbitrary operating system commands by injecting malicious commands via the /bridge spawn command, leading to unauthorized shell access and data exposure.</description><content:encoded><![CDATA[<p>HKUDS OpenHarness is vulnerable to a remote code execution flaw (CVE-2026-7551) affecting the /bridge slash command. This vulnerability permits remote attackers, who are authorized by the OpenHarness configuration, to execute arbitrary operating system commands on the host system. The attack leverages the /bridge spawn command, which, when supplied with attacker-controlled command text, is processed by the bridge session manager and executed through a shared shell subprocess. This execution context grants attackers the ability to spawn shell sessions with the privileges of the OpenHarness process user, potentially exposing local files, credentials, workspace state, and repository contents. Successful exploitation results in a complete compromise of the OpenHarness instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an accessible OpenHarness instance with the vulnerable /bridge slash command enabled.</li>
<li>The attacker authenticates or gains access to a communication channel (e.g., chat application) accepted by OpenHarness.</li>
<li>The attacker crafts a malicious /bridge spawn command containing OS commands to be executed.</li>
<li>The attacker sends the crafted /bridge spawn command to the OpenHarness instance via the configured communication channel.</li>
<li>OpenHarness processes the /bridge command and forwards the attacker-controlled command text to the bridge session manager.</li>
<li>The bridge session manager executes the injected OS commands through a shared shell subprocess.</li>
<li>The attacker gains a shell session with the privileges of the OpenHarness process user.</li>
<li>The attacker accesses local files, credentials, workspace state, and repository contents, potentially exfiltrating sensitive data or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7551 allows attackers to execute arbitrary operating system commands on the OpenHarness server. This grants them the ability to spawn shell sessions as the OpenHarness process user, which can lead to the exposure of sensitive information such as local files, credentials, workspace state, and repository contents. The impact of this vulnerability is significant, potentially allowing for complete system compromise and data exfiltration, but the exact number of victims is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates provided by HKUDS to address CVE-2026-7551 on all OpenHarness instances.</li>
<li>Implement input validation and sanitization on the /bridge slash command to prevent the injection of malicious OS commands.</li>
<li>Monitor process creation events for suspicious shell executions originating from the OpenHarness process using the provided Sigma rule.</li>
<li>Restrict network access to the OpenHarness server to only authorized users and systems.</li>
<li>Review OpenHarness configurations to ensure that only trusted communication channels are accepted.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>injection</category></item><item><title>IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-turbonomic-privesc/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-turbonomic-privesc/</guid><description>IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.</description><content:encoded><![CDATA[<p>CVE-2026-6389 affects IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6. The vulnerability stems from the agent granting excessive cluster-wide permissions within IBM Turbonomic Application Resource Management. A successful exploit allows an attacker who has compromised the operator or its associated service account to gain unrestricted read access to all secrets within the cluster. This vulnerability was reported on April 30, 2026, and poses a significant risk to organizations using the affected versions, potentially leading to complete cluster compromise. Defenders should prioritize patching and monitoring for unauthorized access to sensitive resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the Kubernetes cluster, potentially through exploiting a vulnerability in a separate application or service running within the cluster, or via compromised credentials.</li>
<li>The attacker identifies the IBM Turbonomic prometurbo agent and its associated service account within the compromised cluster.</li>
<li>The attacker leverages the compromised service account or operator to interact with the Kubernetes API, exploiting the excessive cluster-wide permissions granted to the prometurbo agent.</li>
<li>The attacker utilizes the unrestricted read access to enumerate and exfiltrate sensitive credentials stored as secrets within the cluster, including database passwords, API keys, and other sensitive information.</li>
<li>Using the stolen credentials, the attacker escalates privileges by accessing other services and resources within the cluster, such as deploying malicious pods or modifying existing deployments.</li>
<li>The attacker achieves persistence by creating or modifying service accounts, roles, and role bindings to maintain access to the cluster even if the initial point of compromise is remediated.</li>
<li>The attacker moves laterally within the cluster, compromising additional nodes and workloads to expand their control and access to sensitive data.</li>
<li>The attacker achieves full cluster compromise, gaining complete control over all resources and data within the Kubernetes environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploitation of CVE-2026-6389 can lead to a full compromise of the Kubernetes cluster. This includes unrestricted access to sensitive data and the ability to control all workloads and resources within the environment. The impact includes potential data breaches, service disruptions, and significant financial and reputational damage. Organizations in any sector using the affected versions of IBM Turbonomic are at risk, and the severity is heightened in environments handling sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Turbonomic prometurbo agent to a version beyond 8.17.6 to patch CVE-2026-6389.</li>
<li>Review and restrict the permissions granted to the prometurbo agent service account, adhering to the principle of least privilege (reference: CVE-2026-6389).</li>
<li>Implement Kubernetes audit logging to monitor for unauthorized access to secrets and other sensitive resources (reference: Kubernetes documentation).</li>
<li>Deploy the Sigma rule &ldquo;Detect Kubernetes Secret Access via Turbonomic Agent&rdquo; to identify potential exploitation attempts (reference: Sigma rule below).</li>
<li>Monitor for unusual activity originating from the prometurbo agent service account, such as attempts to access or exfiltrate large amounts of data (reference: network_connection log source).</li>
<li>Implement network segmentation to limit the potential impact of a compromised cluster, preventing lateral movement to other environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>credential-access</category><category>kubernetes</category><category>vulnerability</category></item><item><title>IBM Langflow Desktop Vulnerable to Remote Command Execution (CVE-2026-6543)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-langflow-rce/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-langflow-rce/</guid><description>IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to remote command execution, allowing an attacker to execute arbitrary commands with the privileges of the Langflow process, potentially leading to sensitive data exposure and lateral movement.</description><content:encoded><![CDATA[<p>IBM Langflow Desktop, a tool designed to build and experiment with language models, versions 1.0.0 through 1.8.4, contains a remote command execution vulnerability (CVE-2026-6543). An attacker with the ability to influence Langflow&rsquo;s execution can inject and execute arbitrary commands with the same privileges as the Langflow process. This flaw can be exploited to read sensitive environment variables containing API keys and database credentials, modify critical files, and propagate further attacks within the internal network. The vulnerability poses a significant risk to organizations utilizing affected versions of Langflow Desktop, potentially leading to data breaches and system compromise. Defenders should prioritize patching or implementing mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with Langflow Desktop installed (versions 1.0.0 - 1.8.4). This could be achieved through social engineering or by compromising a user account with access to the system.</li>
<li>The attacker crafts a malicious input or payload designed to exploit the command execution vulnerability within Langflow.</li>
<li>The attacker triggers Langflow to process the malicious payload, leveraging the vulnerability to inject and execute arbitrary commands.</li>
<li>The injected command executes with the privileges of the Langflow process, allowing the attacker to interact with the underlying operating system.</li>
<li>The attacker leverages command execution to read sensitive environment variables, potentially obtaining API keys, database credentials, or other sensitive information.</li>
<li>The attacker uses the acquired credentials to access sensitive data or systems within the internal network, escalating their privileges and expanding their reach.</li>
<li>The attacker modifies critical files or installs malicious software, establishing persistence and compromising the integrity of the system.</li>
<li>The attacker launches further attacks on the internal network, leveraging the compromised system as a pivot point to compromise additional systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6543 allows attackers to execute arbitrary commands on systems running vulnerable versions of IBM Langflow Desktop. This can lead to the exposure of sensitive environment variables containing API keys and database credentials, the modification of critical files, and the launching of further attacks on the internal network. The impact can range from data breaches and system compromise to complete control over affected systems and networks. Given the nature of Langflow, targeted sectors likely include organizations involved in AI/ML development and related fields.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Langflow Desktop to a patched version beyond 1.8.4 to remediate CVE-2026-6543, as recommended by IBM.</li>
<li>Deploy the Sigma rule &ldquo;Detect Langflow Process Spawning Suspicious Processes&rdquo; to identify potential exploitation attempts based on unusual child processes spawned by Langflow.</li>
<li>Monitor network connections from Langflow Desktop instances for suspicious outbound traffic, indicating potential data exfiltration or command-and-control activity.</li>
<li>Implement least privilege principles to limit the impact of successful exploitation by restricting the permissions of the Langflow process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2026-6543</category><category>command execution</category><category>code injection</category><category>ibm langflow</category></item><item><title>code-projects Plugin 4.1.2cu.5137 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-code-projects-buffer-overflow/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-code-projects-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-7503) exists in code-projects Plugin 4.1.2cu.5137, allowing a remote attacker to execute arbitrary code by manipulating the 'wepkey2' argument in the 'setWiFiMultipleConfig' function of the '/lib/cste_modules/wireless.so' library, posing a critical risk due to publicly available exploits.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7503, has been discovered in code-projects Plugin version 4.1.2cu.5137. The vulnerability resides within the <code>setWiFiMultipleConfig</code> function in the <code>/lib/cste_modules/wireless.so</code> library, which is part of the <code>/cgi-bin/cstecgi.cgi</code> executable. Successful exploitation is achieved through manipulation of the <code>wepkey2</code> argument, allowing for remote code execution. The vulnerability is considered highly critical due to the availability of a public exploit, increasing the likelihood of widespread exploitation and potential compromise of affected systems. This poses a significant threat to devices utilizing the vulnerable plugin version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system running code-projects Plugin 4.1.2cu.5137.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The request includes a specially crafted payload for the <code>wepkey2</code> argument within the <code>setWiFiMultipleConfig</code> function.</li>
<li>The vulnerable function <code>setWiFiMultipleConfig</code> processes the malicious input without proper bounds checking.</li>
<li>The oversized <code>wepkey2</code> argument overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker injects malicious code into the memory space via the buffer overflow.</li>
<li>The injected code executes, granting the attacker control over the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7503 can lead to complete system compromise, allowing attackers to execute arbitrary code, steal sensitive information, or cause denial-of-service conditions. Due to the ready availability of an exploit, any system running the vulnerable code-projects plugin version 4.1.2cu.5137 is at immediate risk. The lack of specific victim numbers or sector targeting information in the provided source does not diminish the critical nature of the vulnerability given the high CVSS score (8.8) and public exploit.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Code-Projects WiFi Configuration Buffer Overflow Attempt&rdquo; to your SIEM to detect exploitation attempts targeting the vulnerable <code>setWiFiMultipleConfig</code> function and monitor web server logs (cs-uri-query).</li>
<li>Apply input validation and sanitization to prevent buffer overflows. This issue occurs within the <code>/lib/cste_modules/wireless.so</code> library called by <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint, as this is the entry point for exploiting CVE-2026-7503.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7503</category></item><item><title>SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag</title><link>https://feed.craftedsignal.io/briefs/2026-04-sscms-sqli/</link><pubDate>Thu, 30 Apr 2026 21:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sscms-sqli/</guid><description>SSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.</description><content:encoded><![CDATA[<p>SSCMS v7.4.0 is susceptible to a SQL injection vulnerability (CVE-2026-7435) within the <code>stl:sqlContent</code> tag. The vulnerability arises because the <code>queryString</code> attribute is passed directly to database execution without adequate sanitization or parameterization. This flaw enables attackers to inject malicious SQL code by crafting encrypted payloads and submitting them to the <code>/api/stl/actions/dynamic</code> endpoint. Successful exploitation can lead to unauthorized access to the database, disclosure of sensitive information, authentication bypass, modification of data, or even complete compromise of the database. This vulnerability poses a significant risk to organizations using the affected SSCMS version, potentially leading to severe data breaches and system disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an SSCMS v7.4.0 instance.</li>
<li>The attacker crafts a malicious SQL injection payload, specifically targeting the <code>queryString</code> attribute within the <code>stl:sqlContent</code> tag.</li>
<li>The attacker encrypts the crafted SQL injection payload.</li>
<li>The attacker sends the encrypted payload to the <code>/api/stl/actions/dynamic</code> endpoint using an HTTP POST request.</li>
<li>The SSCMS application receives the request and processes the <code>stl:sqlContent</code> tag without proper sanitization.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker gains unauthorized access to the database, potentially extracting sensitive data or modifying existing records.</li>
<li>The attacker may escalate privileges or move laterally within the compromised system, depending on the level of access gained.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to severe consequences. An attacker could gain complete control over the SSCMS database, potentially exposing sensitive user data, confidential business information, or proprietary intellectual property. Data breaches resulting from this vulnerability could lead to significant financial losses, reputational damage, and legal liabilities. The lack of specifics about victim count or sectors targeted makes quantification difficult, but the potential impact is high for any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for SSCMS v7.4.0 to address the SQL injection vulnerability described in CVE-2026-7435.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks, specifically focusing on the <code>queryString</code> attribute of the <code>stl:sqlContent</code> tag.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SSCMS stl:sqlContent Requests</code> to identify potential exploitation attempts targeting the <code>/api/stl/actions/dynamic</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7435</category><category>web-application</category></item><item><title>Synway SMG Gateway Management Software Unauthenticated OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</link><pubDate>Thu, 30 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</guid><description>Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.</description><content:encoded><![CDATA[<p>Synway SMG Gateway Management Software is susceptible to an OS command injection vulnerability (CVE-2025-71284) within the RADIUS configuration endpoint. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted POST request to <code>/en/9-2radius.php</code>. The vulnerability lies in the improper sanitization of the <code>radius_address</code> POST parameter, which is directly incorporated into a <code>sed</code> command. The Shadowserver Foundation observed the first exploitation evidence on 2025-07-11 (UTC). Successful exploitation allows the attacker to execute arbitrary shell commands on the affected system, potentially compromising the entire gateway. This vulnerability poses a significant risk to organizations using the Synway SMG Gateway, as it enables unauthenticated remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Synway SMG Gateway Management Software instance exposed to the network.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/en/9-2radius.php</code> endpoint.</li>
<li>The POST request includes parameters such as <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, or <code>retry</code> along with <code>save=1</code> and <code>enable_radius=1</code>.</li>
<li>The <code>radius_address</code> parameter contains an OS command injection payload.</li>
<li>The application improperly sanitizes the <code>radius_address</code> parameter and incorporates it into a <code>sed</code> command.</li>
<li>The injected command is executed by the operating system, granting the attacker arbitrary code execution privileges.</li>
<li>The attacker establishes a reverse shell to maintain persistence and expand their foothold.</li>
<li>The attacker pivots within the network, gaining access to sensitive data or systems, and potentially establishing a long-term presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the Synway SMG Gateway. This could lead to complete system compromise, data theft, disruption of services, and further propagation of attacks within the network. Given the high CVSS score (9.8), this vulnerability represents a critical threat. The number of affected systems and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; to your SIEM to detect exploitation attempts based on suspicious POST requests to the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, and <code>retry</code> parameters in the RADIUS configuration endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/en/9-2radius.php</code> containing suspicious characters or command sequences indicative of command injection attacks to activate the &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>network</category></item><item><title>Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages</title><link>https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</link><pubDate>Thu, 30 Apr 2026 14:27:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mini-shai-hulud/</guid><description>The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.</description><content:encoded><![CDATA[<p>The Mini Shai-Hulud campaign, active as of April 2026, targets SAP NPM packages used in the SAP Cloud Application Programming (CAP) ecosystem and SAP cloud deployment workflows. Four package versions were compromised: <code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, and <code>@cap-js/sqlite 2.2.2</code>. These packages, with over 500,000 combined weekly downloads, are essential for SAP&rsquo;s Cloud MTA Build Tool and database services for CAP software. The attackers injected a preinstall script that fetches and executes a Bun binary, bypassing security monitoring. The malicious versions were available for a short window of 2-4 hours before being unpublished and superseded by clean versions. Wiz attributes this activity to TeamPCP due to a shared RSA public key used to encrypt the exfiltrated secrets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises an NPM token, possibly exposed through CircleCI.</li>
<li>The attacker injects a malicious <code>preinstall</code> script into the targeted SAP NPM packages (<code>mbt</code>, <code>@cap-js/db-service</code>, <code>@cap-js/postgres</code>, <code>@cap-js/sqlite</code>).</li>
<li>When a user installs the compromised package, the <code>preinstall</code> script executes.</li>
<li>The script fetches a Bun ZIP archive from a GitHub repository.</li>
<li>The script extracts the Bun archive and executes the included Bun binary.</li>
<li>The Bun binary steals local credentials, GitHub and NPM tokens, AWS, Azure, GCP, GitHub Action, and Kubernetes secrets.</li>
<li>The stolen data is exfiltrated to public GitHub repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>The malware propagates by modifying package tarballs, updating versions, repackaging them, and publishing them using stolen GitHub Actions tokens.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mini Shai-Hulud attack poses a significant threat to developers and organizations using SAP CAP, a framework for S/4HANA extensions, Fiori app backends, MTAs, and integration flows. With over 500,000 weekly downloads of the affected packages, a large number of systems could have been affected. Successful exploitation allows attackers to steal sensitive credentials and cloud secrets, potentially leading to unauthorized access to critical SAP systems, cloud infrastructure, and source code repositories. This access could be used for further malicious activities, including data breaches, financial fraud, and supply chain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Organizations using SAP Business Technology Platform workflows, SAP CAP, or MTA-based deployment pipelines should immediately check if they installed the malicious package versions (<code>mbt 1.2.48</code>, <code>@cap-js/db-service 2.10.1</code>, <code>@cap-js/postgres 2.2.2</code>, <code>@cap-js/sqlite 2.2.2</code>) during the exposure window.</li>
<li>Implement network monitoring rules to detect connections to unusual GitHub repositories created to host stolen data. Monitor for repositories with the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li>Monitor process execution for the execution of <code>bun</code> binaries in unusual or unexpected locations to identify systems where compromised packages were installed. Deploy the Sigma rule <code>Detect Bun Execution From NPM Package</code> to detect this behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>npm</category><category>sap</category><category>credential-theft</category></item><item><title>Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel</title><link>https://feed.craftedsignal.io/briefs/2026-04-copy-fail/</link><pubDate>Thu, 30 Apr 2026 13:54:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-copy-fail/</guid><description>A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.</description><content:encoded><![CDATA[<p>A local privilege escalation vulnerability, &ldquo;Copy Fail&rdquo; (CVE-2026-31431), impacts Linux kernels released since 2017. Discovered by Theori&rsquo;s AI-driven pentesting platform Xint Code, the vulnerability allows an unprivileged local attacker to gain root permissions. Theori reported the finding to the Linux kernel security team on March 23, 2026, and patches became available within a week. A proof-of-concept exploit was published, demonstrating a 732-byte script that can root every Linux distribution shipped since 2017. This vulnerability stems from a logic bug in the Linux kernel&rsquo;s authencesn cryptographic template. Theori demonstrated successful exploits on Ubuntu 24.04, Amazon Linux 2023, RHEL 10.1, and SUSE 16.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged local attacker gains access to a vulnerable Linux system.</li>
<li>The attacker utilizes the <code>AF_ALG</code> socket-based interface to access Linux kernel crypto functions from user space.</li>
<li>The attacker uses the <code>splice()</code> system call to perform a controlled 4-byte write in the page cache of a readable file, instead of a normal buffer.</li>
<li>The attacker targets a setuid-root binary file for modification.</li>
<li>The 4-byte write alters the behavior of the setuid-root binary.</li>
<li>The attacker executes the modified setuid-root binary.</li>
<li>Due to the altered behavior, the binary grants the attacker elevated privileges.</li>
<li>The attacker gains root privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the Copy Fail vulnerability (CVE-2026-31431) allows an unprivileged local attacker to gain root privileges on a vulnerable Linux system. Theori demonstrated and confirmed the exploit on Ubuntu 24.04, Amazon Linux 2023, RHEL 10.1, and SUSE 16, highlighting the widespread impact. Multi-tenant Linux hosts, Kubernetes/container clusters, CI runners/build farms, and cloud SaaS environments running user code are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available kernel patches for CVE-2026-31431 on affected Linux distributions, prioritizing multi-tenant environments (e.g., Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, SUSE 16).</li>
<li>As an interim mitigation, disable the vulnerable crypto interface by blocking <code>AF_ALG</code> socket creation or disabling the <code>algif_aead</code> module, as described in the overview.</li>
<li>Monitor for the execution of unusual processes after the modification of binaries in <code>/tmp</code> or <code>/var/tmp</code> using the Sigma rule &ldquo;Detect Suspicious Splice Usage for Privilege Escalation&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Detect algif_aead module removal&rdquo; to detect attempts to disable the vulnerable module.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category></item><item><title>Critical Authentication Bypass Vulnerability in cPanel &amp; WHM (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cpanel-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel &amp; WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-41940, affects all versions of cPanel &amp; WHM. This vulnerability allows unauthenticated remote attackers to gain administrative access to affected systems due to improper handling of session data. Public technical analyses and proof-of-concept code are available, significantly lowering the barrier to exploitation. There are indications that the vulnerability has been actively exploited in the wild, potentially as a zero-day. cPanel &amp; WHM is commonly exposed to the internet and manages hosting environments, making it an attractive target for attackers seeking control over hosting infrastructures and numerous websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a cPanel &amp; WHM server exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the cPanel &amp; WHM login endpoint.</li>
<li>The crafted request manipulates session creation and processing by injecting controlled data into the session files.</li>
<li>This injected data alters authentication-related attributes within the session, bypassing the normal authentication flow.</li>
<li>The attacker successfully establishes a session that is treated as fully authenticated without providing valid credentials.</li>
<li>With administrative privileges, the attacker gains full control over the cPanel server.</li>
<li>The attacker accesses hosted websites and databases, potentially compromising sensitive data.</li>
<li>The attacker establishes persistence through backdoors or additional user accounts, ensuring continued access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 allows attackers to gain complete control over cPanel &amp; WHM servers. This can lead to the compromise of hosted websites, databases, and sensitive customer data. Given the central role of cPanel in hosting environments, this vulnerability can result in large-scale compromise affecting multiple customers and services. The widespread use of cPanel &amp; WHM makes this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by cPanel to address CVE-2026-41940 immediately after thorough testing to prevent exploitation.</li>
<li>Implement increased monitoring and detection capabilities to identify suspicious activity related to CVE-2026-41940 as recommended by CCB.</li>
<li>Review web server logs for unusual patterns or requests targeting cPanel login endpoints to detect potential exploitation attempts. Create a Sigma rule based on webserver logs.</li>
<li>Monitor for unauthorized changes to user accounts or the creation of new administrative accounts on cPanel servers. Create a Sigma rule based on process creation logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>authentication bypass</category><category>cPanel</category><category>web hosting</category><category>vulnerability</category></item><item><title>ABB Edgenius Management Portal Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-edgenius-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-edgenius-auth-bypass/</guid><description>An authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.</description><content:encoded><![CDATA[<p>ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 are vulnerable to an authentication bypass (CVE-2025-10571). An attacker who has gained network access to a vulnerable Edgenius deployment can send a specially crafted message to the system node, bypassing authentication controls. Successful exploitation allows an attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications. ABB reported this vulnerability to CISA. ABB has released version 3.2.2.0 to address the vulnerability. As a mitigation, ABB advises customers to disable the Edgenius Management Portal until the upgrade can be applied.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the network where the Edgenius Management Portal is deployed.</li>
<li>The attacker identifies a vulnerable ABB Edgenius Management Portal instance (versions 3.2.0.0 or 3.2.1.1).</li>
<li>The attacker crafts a malicious message designed to exploit the authentication bypass vulnerability (CVE-2025-10571).</li>
<li>The attacker sends the specially crafted message to the system node of the Edgenius Management Portal.</li>
<li>The vulnerable Edgenius Management Portal improperly processes the crafted message, bypassing authentication.</li>
<li>The attacker leverages the bypassed authentication to install and execute arbitrary code on the system.</li>
<li>The attacker uninstalls applications, further compromising the system&rsquo;s functionality.</li>
<li>The attacker modifies the configuration of installed applications to maintain persistence and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain full control over the ABB Edgenius Management Portal. The attacker can install malicious software, uninstall critical applications, and modify configurations, leading to significant disruption of industrial processes, data theft, or further lateral movement within the OT network. Affected sectors include critical manufacturing and information technology, with deployments worldwide.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ABB Ability Edgenius version 3.2.2.0 to remediate CVE-2025-10571, as this version contains the vendor fix.</li>
<li>Until the upgrade is applied, disable the Edgenius Management Portal to mitigate the vulnerability as recommended by ABB.</li>
<li>Minimize network exposure for all control system devices by ensuring they are not accessible from the internet, as suggested by CISA.</li>
<li>Locate control system networks and remote devices behind firewalls, isolating them from business networks per CISA recommendations.</li>
<li>Implement the Sigma rule &ldquo;Detect ABB Edgenius Management Portal Exploitation Attempt&rdquo; to identify potential exploitation attempts based on network traffic patterns.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>abb</category><category>edgenius</category><category>authentication bypass</category><category>CVE-2025-10571</category><category>critical infrastructure</category></item><item><title>ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-symphony-vulns/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-symphony-vulns/</guid><description>Multiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.</description><content:encoded><![CDATA[<p>ABB Ability Symphony Plus Engineering versions 2.2 through 2.4 SP2 are susceptible to multiple vulnerabilities originating in the included PostgreSQL database. An attacker gaining access to the S+ Client Server network could exploit CVE-2023-5869 (Integer Overflow), CVE-2023-39417 (SQL Injection), and CVE-2024-7348 (TOCTOU race condition) to execute arbitrary code and potentially compromise the entire ABB system. This poses a significant risk to organizations in critical infrastructure sectors, including Chemical, Critical Manufacturing, Energy, and Water/Wastewater, as these systems are vital for operational control and safety. Successful exploitation could result in loss of control, data breaches, or disruption of essential services. ABB released S+ Engineering 2.4 SP2 RU1 in December 2024 as a fix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target network, specifically the S+ Client Server network, possibly through existing vulnerabilities or misconfigurations.</li>
<li>Attacker authenticates to the PostgreSQL database server used by ABB Ability Symphony Plus Engineering.</li>
<li>Attacker exploits CVE-2023-5869 by providing crafted data to trigger an integer overflow, enabling arbitrary code execution.</li>
<li>Alternatively, the attacker exploits CVE-2023-39417 by injecting malicious SQL code through extension scripts, leading to arbitrary code execution with administrator privileges.</li>
<li>Alternatively, the attacker exploits CVE-2024-7348, leveraging a TOCTOU race condition to execute arbitrary SQL functions with elevated privileges using a PostgreSQL utility.</li>
<li>The attacker executes arbitrary code within the context of the compromised ABB Ability Symphony Plus Engineering application or the underlying PostgreSQL database.</li>
<li>The attacker leverages the compromised system to move laterally within the OT network, potentially targeting other critical systems or data repositories.</li>
<li>Attacker achieves complete compromise of the ABB Ability Symphony Plus Engineering system, allowing manipulation of industrial processes, data exfiltration, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in ABB Ability Symphony Plus Engineering can have severe consequences, particularly in critical infrastructure sectors. Affected sectors include chemical, critical manufacturing, energy, and water/wastewater facilities worldwide. A compromised system could allow attackers to manipulate industrial processes, leading to equipment damage, environmental incidents, or disruption of essential services like power generation or water treatment. The vulnerabilities could allow attackers to gain unauthorized access to sensitive data, intellectual property, or control systems, resulting in significant financial losses, reputational damage, and potential safety risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ABB Ability Symphony Plus Engineering to version 2.4 SP2 RU1 (re-leased in December 2024) or later, as recommended by ABB, to address the identified vulnerabilities (Vendor fix).</li>
<li>Review and enforce network segmentation and firewall configurations to restrict access to the S+ client/server network, mitigating the risk of external attackers exploiting these vulnerabilities (Mitigation).</li>
<li>Monitor network traffic for suspicious activity indicative of PostgreSQL exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious PostgreSQL Utility Execution</code> to identify potential exploitation of CVE-2024-7348.</li>
<li>Enable logging of PostgreSQL queries and analyze logs for SQL injection attempts, specifically looking for suspicious use of extension scripts. Deploy the Sigma rule <code>Detect SQL Injection in PostgreSQL Logs</code> to identify potential exploitation of CVE-2023-39417.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>ics</category><category>postgresql</category></item><item><title>Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-freebsd-vulns/</link><pubDate>Thu, 30 Apr 2026 11:09:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-freebsd-vulns/</guid><description>Multiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.</description><content:encoded><![CDATA[<p>FreeBSD OS is susceptible to multiple vulnerabilities that could allow a remote attacker to compromise the system. These vulnerabilities can be exploited to gain elevated privileges, including superuser rights, execute arbitrary code with administrative privileges, manipulate sensitive data, disclose confidential information, or cause a denial-of-service condition. The specific nature of these vulnerabilities is not disclosed, but the potential impact is severe, making patching and monitoring critical. This poses a significant risk to organizations relying on FreeBSD for critical infrastructure components, potentially leading to data breaches, system outages, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable FreeBSD system exposed to a network.</li>
<li>The attacker exploits a vulnerability to gain initial access.</li>
<li>The attacker leverages a privilege escalation vulnerability to gain root privileges.</li>
<li>The attacker executes arbitrary code with elevated privileges.</li>
<li>The attacker installs a backdoor for persistent access.</li>
<li>The attacker manipulates system data to compromise integrity.</li>
<li>The attacker exfiltrates sensitive information from the compromised system.</li>
<li>The attacker causes a denial-of-service condition, disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to a complete compromise of FreeBSD systems. This could result in data breaches, system outages, and unauthorized access to sensitive information. The absence of specific victim counts or sector targeting details in the source material suggests a broad potential impact across various industries and organizations utilizing FreeBSD. The ultimate consequence is a loss of confidentiality, integrity, and availability of affected systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided to your SIEM to detect exploitation attempts.</li>
<li>Monitor system logs for suspicious activity indicative of compromise (related to privilege escalation, unauthorized code execution).</li>
<li>Apply available patches and updates to FreeBSD OS as soon as they are released to remediate known vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>code-execution</category></item><item><title>Multiple Vulnerabilities in CUPS</title><link>https://feed.craftedsignal.io/briefs/2026-05-cups-vulns/</link><pubDate>Thu, 30 Apr 2026 09:43:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cups-vulns/</guid><description>Multiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in CUPS, a popular open-source printing system. These vulnerabilities can be exploited by an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service (DoS) condition. The specifics of the vulnerabilities are not detailed in the source document, but the potential impact suggests a high level of risk. Defenders should monitor CUPS deployments for suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with a vulnerable CUPS installation.</li>
<li>The attacker exploits a vulnerability in CUPS (specific CVE not identified) to bypass authentication or authorization controls.</li>
<li>Leveraging the bypassed security measures, the attacker executes arbitrary code within the context of the CUPS service.</li>
<li>The attacker escalates privileges, potentially gaining root or system-level access, due to insecure configurations or further vulnerabilities within CUPS.</li>
<li>With elevated privileges, the attacker manipulates sensitive data related to print jobs, configurations, or user information.</li>
<li>Alternatively, the attacker triggers a denial-of-service condition, rendering the printing service unavailable by exploiting a resource exhaustion vulnerability.</li>
<li>The attacker leverages the compromised CUPS service as a pivot point to gain access to other systems on the network.</li>
<li>The final objective is to compromise sensitive data, disrupt printing services, or gain a foothold for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these CUPS vulnerabilities could lead to significant damage, including unauthorized access to sensitive documents, disruption of critical printing services, and potential compromise of other systems on the network. The lack of specific victim numbers or sector targeting in the source document suggests this is a general advisory.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor CUPS server logs for unexpected process execution and privilege escalation attempts (enable process_creation logging and deploy the &ldquo;Detect Suspicious CUPS Process Execution&rdquo; Sigma rule).</li>
<li>Inspect CUPS configuration files for unauthorized modifications that could indicate malicious activity (enable file_event logging and deploy the &ldquo;Detect Suspicious CUPS Configuration Modification&rdquo; Sigma rule).</li>
<li>Analyze network traffic to and from CUPS servers for anomalous patterns that may indicate exploitation attempts or data exfiltration (enable network_connection logging).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cups</category><category>vulnerability</category><category>privilege-escalation</category><category>execution</category><category>denial-of-service</category></item><item><title>GIMP Multiple Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-gimp-rce/</link><pubDate>Thu, 30 Apr 2026 09:18:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gimp-rce/</guid><description>A remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in GIMP allow a remote, anonymous attacker to execute arbitrary code on a vulnerable system. The specific vulnerabilities are not detailed in the advisory, but the potential impact is significant, as successful exploitation could allow an attacker to gain complete control over the affected system. This threat is relevant to organizations and individuals using GIMP in their environments. Defenders should focus on detecting anomalous process execution originating from GIMP or unexpected network connections initiated by the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious image or file designed to exploit a vulnerability in GIMP.</li>
<li>The attacker delivers the malicious file to a target user, potentially through social engineering or a compromised website.</li>
<li>The target user opens the malicious file with GIMP.</li>
<li>GIMP parses the malicious file, triggering the unspecified vulnerability.</li>
<li>The vulnerability allows the attacker to execute arbitrary code within the context of the GIMP process.</li>
<li>The attacker leverages the initial code execution to escalate privileges or establish persistence on the system.</li>
<li>The attacker may then install malware, exfiltrate sensitive data, or perform other malicious activities.</li>
<li>The attacker achieves their objective, such as data theft, system compromise, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to arbitrary code execution, potentially granting an attacker complete control over the affected system. This could result in data theft, malware installation, system compromise, or disruption of services. The advisory does not specify the number of potential victims, but given the popularity of GIMP, the impact could be widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unexpected child processes spawned by GIMP to detect potential exploitation attempts. Deploy the Sigma rule <code>GIMP Suspicious Child Processes</code> to your SIEM.</li>
<li>Monitor network connections originating from GIMP for connections to unusual or malicious domains. Deploy the Sigma rule <code>GIMP Suspicious Network Connections</code> to your SIEM.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>gimp</category></item><item><title>Multiple Vulnerabilities in Wazuh Allow for Code Execution and Data Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-05-wazuh-multiple-vulnerabilities/</link><pubDate>Thu, 30 Apr 2026 09:09:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wazuh-multiple-vulnerabilities/</guid><description>Multiple vulnerabilities in Wazuh allow an attacker to perform a denial of service attack, execute arbitrary code, manipulate data, disclose confidential information, or bypass security measures.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified within Wazuh, a widely used security information and event management (SIEM) and extended detection and response (XDR) platform. While the specific CVEs and technical details remain undisclosed in this initial advisory, the potential impact is significant. A remote, unauthenticated attacker could exploit these vulnerabilities to achieve a range of malicious outcomes, including denial of service, arbitrary code execution, data manipulation, sensitive information disclosure, and the circumvention of security controls. The vulnerabilities affect Wazuh installations across Linux, Windows, and macOS environments. Due to the broad functionality of Wazuh in security monitoring and incident response, successful exploitation could lead to widespread compromise within targeted organizations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Wazuh instance accessible over the network.</li>
<li>The attacker exploits a vulnerability to bypass authentication or authorization controls.</li>
<li>The attacker leverages an arbitrary code execution vulnerability to gain remote shell access to the Wazuh server.</li>
<li>The attacker escalates privileges to gain root or SYSTEM level access on the Wazuh server.</li>
<li>The attacker manipulates Wazuh configuration files to disable security alerts or modify monitoring rules.</li>
<li>The attacker injects malicious code into Wazuh agents to compromise endpoints managed by the platform.</li>
<li>The attacker uses the compromised Wazuh infrastructure to exfiltrate sensitive data collected by the platform.</li>
<li>The attacker launches denial-of-service attacks against monitored systems using compromised Wazuh agents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have severe consequences. An attacker could gain complete control over the Wazuh platform, disabling security monitoring, manipulating security data, and compromising monitored endpoints. This could lead to undetected data breaches, widespread malware infections, and significant disruption of IT operations. The lack of specific vulnerability information makes it difficult to assess the exact scope of impact, but the wide deployment of Wazuh in security-critical environments means that numerous organizations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Wazuh server process creation for unusual child processes that might indicate exploitation, using the &ldquo;Wazuh Server Suspicious Process&rdquo; Sigma rule.</li>
<li>Inspect Wazuh server logs for authentication bypass attempts and unauthorized configuration changes.</li>
<li>Block network connections originating from newly created Wazuh agent processes using the &ldquo;Wazuh Agent Outbound Connection&rdquo; Sigma rule, to prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>siem</category><category>xdr</category></item><item><title>CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-1005/</link><pubDate>Thu, 30 Apr 2026 07:46:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-1005/</guid><description>CVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-1005 describes an integer underflow vulnerability within a Microsoft product&rsquo;s implementation of AES-GCM, CCM, and ARIA-GCM decryption algorithms. This flaw allows an attacker to trigger an out-of-bounds memory access. While the specific product affected is not detailed in the provided source, the vulnerability lies within the cryptographic functions used for data decryption, indicating a potential impact on confidentiality and integrity. Successful exploitation could allow an attacker to execute arbitrary code or disclose sensitive information. Given the widespread use of these encryption algorithms, this vulnerability poses a significant risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system utilizing the vulnerable Microsoft product and its AES-GCM/CCM/ARIA-GCM decryption implementation.</li>
<li>Attacker crafts a malicious input designed to trigger the integer underflow during the decryption process.</li>
<li>The crafted input is sent to the vulnerable system for decryption. This could be via a network protocol, file processing, or other data ingestion method.</li>
<li>The vulnerable decryption routine processes the input, leading to an integer underflow.</li>
<li>The integer underflow results in an out-of-bounds memory access during the decryption operation.</li>
<li>This out-of-bounds memory access allows the attacker to read sensitive data from memory locations outside the intended buffer.</li>
<li>Alternatively, the attacker leverages the out-of-bounds write to overwrite critical data structures or executable code within the process&rsquo;s memory space.</li>
<li>If code is overwritten, the attacker gains arbitrary code execution within the context of the vulnerable process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-1005 could lead to unauthorized information disclosure, allowing attackers to steal sensitive data that was intended to be protected by encryption. In a more severe scenario, the vulnerability can be leveraged for arbitrary code execution, enabling attackers to gain control over the affected system. The lack of specific product information makes it difficult to quantify the exact number of potential victims, but the vulnerability&rsquo;s presence in widely used cryptographic functions implies a broad impact across various sectors and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unexpected memory access patterns in processes performing AES-GCM/CCM/ARIA-GCM decryption, using a host-based intrusion detection system (HIDS).</li>
<li>Deploy the Sigma rule &ldquo;Detect Potential Exploitation of CVE-2026-1005&rdquo; to identify suspicious processes that might be exploiting the vulnerability.</li>
<li>Apply any available patches or updates released by Microsoft to address CVE-2026-1005 as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>cryptography</category><category>memory corruption</category><category>aes-gcm</category></item><item><title>Tenda 4G300 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</link><pubDate>Thu, 30 Apr 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</guid><description>A remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda 4G300 routers, specifically version US_4G300V1.0Mt_V1.01.42_CN_TDC01. The vulnerability resides within the <code>sub_427C3C</code> function located in the <code>/goform/SafeMacFilter</code> file. An attacker can exploit this flaw by manipulating the <code>page</code> argument in a crafted request, leading to a buffer overflow and potentially allowing for arbitrary code execution on the affected device. The vulnerability, identified as CVE-2026-7470, poses a significant risk as remote exploitation is possible, and a proof-of-concept exploit is publicly available, increasing the likelihood of malicious actors leveraging this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda 4G300 router running the vulnerable firmware version US_4G300V1.0Mt_V1.01.42_CN_TDC01.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeMacFilter</code> endpoint.</li>
<li>The crafted request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>sub_427C3C</code> function.</li>
<li>The router processes the HTTP request, passing the oversized <code>page</code> argument to the vulnerable function.</li>
<li>The <code>sub_427C3C</code> function attempts to write the oversized data into a stack-based buffer, causing a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory on the stack, including the return address.</li>
<li>The attacker redirects execution flow to a malicious code payload injected into the request or elsewhere in memory.</li>
<li>The injected code executes with the privileges of the router process, potentially allowing the attacker to gain full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda 4G300 router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a launching point for further attacks against other devices on the network or the internet. Given the widespread use of these routers in homes and small businesses, a successful attack could impact a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/goform/SafeMacFilter</code> with abnormally long <code>page</code> parameters. Use the provided Sigma rule to detect suspicious activity.</li>
<li>Implement rate limiting on the <code>/goform/SafeMacFilter</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7470.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-7470</category></item><item><title>Multiple Vulnerabilities in Red Hat Linux Kernel</title><link>https://feed.craftedsignal.io/briefs/2026-04-redhat-kernel-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-redhat-kernel-vulns/</guid><description>Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.</description><content:encoded><![CDATA[<p>On April 30, 2026, CERT-FR published an advisory regarding multiple vulnerabilities in the Red Hat Linux kernel. These vulnerabilities, detailed in Red Hat Security Advisories RHSA-2026:10756, RHSA-2026:10996, and RHSA-2026:11313, can lead to significant security risks including arbitrary code execution, privilege escalation, and remote denial of service. The affected systems include various versions and architectures of Red Hat CodeReady Linux Builder and Red Hat Enterprise Linux. Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized access, control systems, or disrupt services, impacting the confidentiality, integrity, and availability of affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise (via unconfirmed vector):</strong> An attacker identifies a vulnerable Red Hat Linux system running an affected kernel version. While the exact exploit vector isn&rsquo;t specified in the advisory, it involves a vulnerability in the kernel.</li>
<li><strong>Exploit Trigger:</strong> The attacker triggers a specific kernel vulnerability, such as those identified as CVE-2026-23001 or CVE-2026-31402, by sending a crafted input to a vulnerable kernel component. The specific method depends on the nature of each CVE.</li>
<li><strong>Code Execution:</strong> Upon successful exploitation, the attacker achieves arbitrary code execution within the kernel context. This allows the attacker to run malicious code directly on the system.</li>
<li><strong>Privilege Escalation:</strong> Leveraging the code execution capability, the attacker exploits another vulnerability (e.g., CVE-2025-68741) to escalate privileges to root or SYSTEM. This may involve exploiting race conditions, memory corruption bugs, or other privilege escalation flaws within the kernel.</li>
<li><strong>System Control:</strong> With elevated privileges, the attacker gains full control over the compromised system. They can now access sensitive data, modify system configurations, install backdoors, or move laterally to other systems within the network.</li>
<li><strong>Lateral Movement (Optional):</strong> The attacker uses the compromised system as a launching point to attack other systems on the network, potentially exploiting other vulnerabilities or using stolen credentials.</li>
<li><strong>Persistence (Optional):</strong> The attacker establishes persistence on the compromised system to maintain access even after reboots. This may involve installing rootkits, modifying system startup scripts, or creating rogue user accounts.</li>
<li><strong>Denial of Service/Data Exfiltration/etc.:</strong> Depending on their objectives, the attacker may use the compromised system to launch denial-of-service attacks against other targets, exfiltrate sensitive data, or cause other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these kernel vulnerabilities can lead to complete system compromise, allowing attackers to execute arbitrary code, escalate privileges, and cause denial of service. The wide range of affected Red Hat Enterprise Linux and CodeReady Linux Builder versions implies a potentially large number of vulnerable systems. This can result in significant data breaches, system downtime, financial losses, and reputational damage for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches provided in Red Hat Security Advisories RHSA-2026:10756, RHSA-2026:10996, and RHSA-2026:11313 to remediate the vulnerabilities.</li>
<li>Prioritize patching systems based on their criticality and exposure to external networks.</li>
<li>Monitor systems for suspicious activity that may indicate exploitation attempts, focusing on unexpected kernel module loads or privilege escalations using process_creation logging.</li>
<li>Deploy the Sigma rule detecting suspicious kernel module loading to identify potential rootkit installation attempts.</li>
<li>Investigate any alerts generated by the deployed Sigma rules to determine the scope and impact of potential compromises.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>kernel</category><category>redhat</category><category>execution</category><category>privilege-escalation</category><category>denial-of-service</category></item><item><title>UTT HiPER 1250GW Buffer Overflow Vulnerability (CVE-2026-7420)</title><link>https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability in UTT HiPER 1250GW devices (versions up to 3.2.7-210907-180535) allows remote attackers to execute arbitrary code by manipulating the 'Profile' argument in the `strcpy` function of the `route/goform/ConfigAdvideo` file, due to insufficient bounds checking.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-7420, has been identified in UTT HiPER 1250GW devices. The vulnerability exists in versions up to 3.2.7-210907-180535. The vulnerability lies within the <code>strcpy</code> function in the <code>route/goform/ConfigAdvideo</code> file, where the &lsquo;Profile&rsquo; argument is not properly validated, leading to a buffer overflow condition. This allows unauthenticated remote attackers to potentially execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of exploitation. Defenders should implement mitigations and detection strategies immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable UTT HiPER 1250GW device exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>route/goform/ConfigAdvideo</code> endpoint.</li>
<li>The HTTP request includes a &lsquo;Profile&rsquo; argument with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>strcpy</code> function attempts to copy the oversized &lsquo;Profile&rsquo; argument into the undersized buffer.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions.</li>
<li>The attacker injects malicious code into the overflowed memory region to gain code execution.</li>
<li>The attacker achieves remote code execution on the UTT HiPER 1250GW device.</li>
<li>The attacker gains control of the device, potentially using it for further malicious activities such as lateral movement, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the UTT HiPER 1250GW device. This can lead to complete compromise of the device, potentially enabling attackers to gain unauthorized access to the network it is connected to, exfiltrate sensitive data, or use the device as a bot in a botnet. The impact is significant, especially if these devices are used in critical infrastructure or sensitive environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates for UTT HiPER 1250GW devices to remediate CVE-2026-7420.</li>
<li>Implement network segmentation to isolate UTT HiPER 1250GW devices from critical network segments.</li>
<li>Deploy the Sigma rule <code>Detect UTT HiPER Buffer Overflow Attempt</code> to identify malicious HTTP requests targeting the <code>route/goform/ConfigAdvideo</code> endpoint.</li>
<li>Monitor web server logs for unusual activity and large &lsquo;Profile&rsquo; argument values in requests to <code>route/goform/ConfigAdvideo</code> to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>iot</category></item><item><title>Compromised SAP npm Packages Steal Developer Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</link><pubDate>Wed, 29 Apr 2026 22:43:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sap-npm-compromise/</guid><description>Multiple official SAP npm packages were compromised via a supply chain attack, likely by TeamPCP, to steal credentials and authentication tokens from developers' systems.</description><content:encoded><![CDATA[<p>On April 29, 2026, security researchers discovered that multiple official SAP npm packages were compromised in a supply-chain attack, suspected to be carried out by TeamPCP. The compromised packages, including <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48), support SAP&rsquo;s Cloud Application Programming Model (CAP) and Cloud MTA, commonly used in enterprise development. The attack involves injecting a malicious &lsquo;preinstall&rsquo; script into these packages, which executes automatically during installation. This script downloads and executes a heavily obfuscated JavaScript payload designed to steal sensitive credentials from developer machines and CI/CD environments. This incident highlights the ongoing risk of supply chain attacks targeting widely used development tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> Threat actors compromise official SAP npm packages (<code>@cap-js/sqlite</code>, <code>@cap-js/postgres</code>, <code>@cap-js/db-service</code>, <code>mbt</code>). The exact method of initial compromise is currently unknown, but a misconfigured CircleCI job is suspected.</li>
<li><strong>Package Modification:</strong> The compromised npm packages are modified to include a malicious &lsquo;preinstall&rsquo; script.</li>
<li><strong>Installation Trigger:</strong> When developers install the compromised packages using <code>npm install</code>, the &lsquo;preinstall&rsquo; script executes automatically.</li>
<li><strong>Payload Download:</strong> The &lsquo;preinstall&rsquo; script launches a loader named <code>setup.mjs</code> that downloads the Bun JavaScript runtime from GitHub.</li>
<li><strong>Execution of Information Stealer:</strong> The Bun runtime is used to execute a heavily obfuscated <code>execution.js</code> payload, which acts as an information stealer.</li>
<li><strong>Credential Theft:</strong> The information stealer targets a wide variety of credentials, including npm and GitHub authentication tokens, SSH keys, cloud credentials for AWS, Azure, and Google Cloud, Kubernetes configurations and secrets, and CI/CD pipeline secrets and environment variables.  It also attempts to extract secrets directly from the CI runner&rsquo;s memory by scanning <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code>.</li>
<li><strong>Data Exfiltration:</strong> The stolen data is encrypted and uploaded to public GitHub repositories under the victim&rsquo;s account. These repositories include the description &ldquo;A Mini Shai-Hulud has Appeared&rdquo;.</li>
<li><strong>Lateral Movement:</strong> The malware searches GitHub commits for the string <code>OhNoWhatsGoingOnWithGitHub:&lt;base64&gt;</code>, decoding matching commit messages into GitHub tokens to gain further access and propagate to other packages and repositories, injecting the same malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack can lead to the theft of sensitive credentials, allowing attackers to gain unauthorized access to internal systems, cloud infrastructure, and source code repositories. The compromised credentials and secrets can be used for lateral movement within the victim&rsquo;s network, data exfiltration, and further supply chain attacks. The use of stolen credentials to modify other packages increases the scope of the attack, potentially impacting a large number of developers and organizations using the compromised SAP packages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of <code>preinstall</code> scripts executing unusual processes, such as the execution of <code>setup.mjs</code> or the download of the Bun JavaScript runtime from GitHub; implement the <code>Detect Suspicious NPM Package Preinstall Script</code> Sigma rule.</li>
<li>Implement the <code>Detect GitHub Repository Creation with &quot;A Mini Shai-Hulud has Appeared&quot; Description</code> Sigma rule to detect exfiltration attempts via public GitHub repositories.</li>
<li>Audit CI/CD pipeline configurations and restrict access to sensitive credentials and secrets to prevent exposure via misconfigured jobs; remediate the reported CircleCI misconfiguration.</li>
<li>Monitor process memory for credential harvesting activity targeting Runner processes in CI/CD environments, specifically looking for reads of <code>/proc/&lt;pid&gt;/maps</code> and <code>/proc/&lt;pid&gt;/mem</code> as outlined in the overview.</li>
<li>Deprecate and remove the compromised packages <code>@cap-js/sqlite</code> (v2.2.2), <code>@cap-js/postgres</code> (v2.2.2), <code>@cap-js/db-service</code> (v2.10.1), and <code>mbt</code> (v1.2.48) from your development and CI/CD environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>credential-theft</category><category>npm</category></item><item><title>UTT HiPER 1250GW Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-overflow/</link><pubDate>Wed, 29 Apr 2026 22:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-overflow/</guid><description>A remote buffer overflow vulnerability exists in the UTT HiPER 1250GW device due to improper handling of the 'Profile' argument in the NTP configuration, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7418, has been discovered in UTT HiPER 1250GW devices with firmware versions up to 3.2.7-210907-180535. The vulnerability resides within the <code>strcpy</code> function in the <code>route/goform/NTP</code> file. A remote attacker can exploit this vulnerability by manipulating the <code>Profile</code> argument during NTP configuration. Successful exploitation could lead to arbitrary code execution on the affected device. The vulnerability has been publicly disclosed, increasing the risk of exploitation. This poses a significant threat to organizations using the affected UTT HiPER 1250GW devices, as attackers could potentially gain control of the device and use it as a foothold for further malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable UTT HiPER 1250GW device with a firmware version up to 3.2.7-210907-180535.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/route/goform/NTP</code> endpoint.</li>
<li>The crafted request includes a specially designed <code>Profile</code> argument containing a payload that exceeds the buffer size allocated for it.</li>
<li>The web server on the UTT HiPER 1250GW device receives the HTTP request and passes the <code>Profile</code> argument to the <code>strcpy</code> function.</li>
<li>The <code>strcpy</code> function copies the oversized <code>Profile</code> argument into the undersized buffer, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker gains arbitrary code execution on the device with the privileges of the web server process.</li>
<li>The attacker can then use this foothold to further compromise the device or the network it is connected to, potentially leading to data exfiltration or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7418 can allow a remote attacker to execute arbitrary code on the affected UTT HiPER 1250GW device. This could allow the attacker to gain full control of the device, potentially leading to data exfiltration, denial-of-service attacks, or further compromise of the network to which the device is connected. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Given the public availability of the exploit, organizations using the affected devices are at increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by UTT to address CVE-2026-7418 on HiPER 1250GW devices.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NTP Profile Argument</code> to detect exploitation attempts against the <code>/route/goform/NTP</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/route/goform/NTP</code> endpoint with unusually long <code>Profile</code> arguments to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7418</category></item><item><title>PolarVista xcode-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-polarvista-command-injection/</link><pubDate>Wed, 29 Apr 2026 22:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-polarvista-command-injection/</guid><description>PolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.</description><content:encoded><![CDATA[<p>PolarVista xcode-mcp-server version 1.0.0 is vulnerable to OS command injection (CVE-2026-7416). This vulnerability exists in the <code>build_project/run_tests</code> function within the <code>src/index.ts</code> file of the MCP Interface component. An attacker can remotely inject operating system commands by manipulating the Request argument. The vulnerability has been publicly disclosed, increasing the risk of exploitation. The vendor has been notified but has not yet responded, leaving systems exposed. This poses a significant risk to organizations using this software, as successful exploitation allows complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of PolarVista xcode-mcp-server 1.0.0.</li>
<li>The attacker crafts a malicious request targeting the <code>build_project/run_tests</code> function in <code>src/index.ts</code>.</li>
<li>The malicious request includes an OS command injection payload within the Request argument.</li>
<li>The application fails to properly sanitize or validate the Request argument.</li>
<li>The application executes the injected OS command on the server.</li>
<li>The attacker gains arbitrary code execution on the server, potentially escalating privileges.</li>
<li>The attacker installs malware, such as a reverse shell, to maintain persistent access.</li>
<li>The attacker performs reconnaissance, lateral movement, and data exfiltration within the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected server. This can lead to complete system compromise, data breaches, and denial of service. There are no reported victims or sectors targeted at this time, but given the ease of exploitation and public availability, the risk is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from PolarVista as soon as they are released to remediate CVE-2026-7416.</li>
<li>Implement input validation and sanitization for the Request argument in the <code>build_project/run_tests</code> function to prevent command injection.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>build_project/run_tests</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious xcode-mcp-server Requests&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>xcode-mcp-server</category></item><item><title>n8n XML Node Prototype Pollution Leading to RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-n8n-rce/</link><pubDate>Wed, 29 Apr 2026 21:25:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-n8n-rce/</guid><description>A vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-42232, exists within the n8n workflow automation tool. This flaw allows an authenticated user, who possesses permissions to create or modify workflows, to achieve remote code execution (RCE). The attack vector involves exploiting global prototype pollution through the XML Node. Versions affected include those prior to 1.123.32, versions 2.17.0 up to but not including 2.17.4, and versions 2.18.0 up to but not including 2.18.1. Defenders should prioritize patching n8n instances due to the high potential for complete system compromise if exploited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to an n8n instance with workflow creation/modification privileges.</li>
<li>The attacker crafts a malicious workflow that leverages the XML Node to inject a payload designed to trigger prototype pollution.</li>
<li>The crafted XML node manipulates global object prototypes within the n8n application.</li>
<li>The attacker introduces a property into a global object prototype that can be exploited by another node.</li>
<li>The attacker adds a secondary node (e.g., Function node) that leverages the polluted prototype property.</li>
<li>The secondary node&rsquo;s execution triggers the polluted prototype, leading to arbitrary code execution.</li>
<li>The attacker executes arbitrary commands on the n8n server.</li>
<li>The attacker gains complete control of the n8n server, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the n8n server. This can lead to full system compromise, including data exfiltration, credential theft, and lateral movement within the network. Given the nature of n8n as an automation platform, successful attacks can severely impact connected systems and services. This vulnerability affects n8n users who have not upgraded to patched versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 1.123.32, 2.17.4, 2.18.1, or later to remediate CVE-2026-42232.</li>
<li>As a temporary mitigation, limit workflow creation and editing permissions to only fully trusted users as suggested in the advisory.</li>
<li>As a temporary mitigation, disable the XML node by adding <code>n8n-nodes-base.xml</code> to the <code>NODES_EXCLUDE</code> environment variable as suggested in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>prototype pollution</category><category>n8n</category></item><item><title>n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-rce/</link><pubDate>Wed, 29 Apr 2026 21:25:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-rce/</guid><description>A prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.</description><content:encoded><![CDATA[<p>A critical vulnerability exists within the n8n workflow automation platform, specifically affecting the parsing of XML request bodies in webhook handlers. This flaw stems from the use of the <code>xml2js</code> library, which is susceptible to prototype pollution attacks. An authenticated user possessing the capability to create or modify workflows can leverage this vulnerability by sending a specially crafted XML payload. Successful exploitation results in the pollution of the JavaScript object prototype. Attackers can chain this pollution with the Git node&rsquo;s SSH operations to achieve arbitrary remote code execution (RCE) on the underlying n8n host. The vulnerability affects n8n versions prior to 1.123.32, versions 2.17.0 to 2.17.3, and versions 2.18.0 to 2.18.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the n8n instance.</li>
<li>The attacker crafts a malicious XML payload designed to exploit the prototype pollution vulnerability in the <code>xml2js</code> library.</li>
<li>The attacker creates or modifies a workflow containing a webhook node configured to receive XML data.</li>
<li>The attacker sends the crafted XML payload to the webhook endpoint.</li>
<li>The <code>xml2js</code> library parses the malicious XML, inadvertently polluting the JavaScript object prototype with attacker-controlled properties.</li>
<li>The attacker includes a Git node in the workflow.</li>
<li>The polluted prototype modifies the behavior of the Git node&rsquo;s SSH operations.</li>
<li>When the workflow executes, the Git node&rsquo;s SSH operation is hijacked due to the prototype pollution, leading to arbitrary code execution on the n8n host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a malicious actor to execute arbitrary code on the n8n server. This grants them complete control over the n8n instance and potentially the underlying infrastructure. The vulnerability impacts any n8n instance accessible to authenticated users who can create or modify workflows. The number of affected installations is unknown, but the potential impact is high due to the sensitive nature of workflows often managed by n8n, which can include access to other systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 1.123.32, 2.17.4, 2.18.1, or later to patch the vulnerability as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;Detect n8n Prototype Pollution via Crafted XML Payload&rdquo; to detect malicious XML payloads targeting the vulnerability. Enable webserver logs to activate this rule.</li>
<li>Limit workflow creation and editing permissions to trusted users to mitigate the risk of exploitation, as described in the workaround.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>prototype-pollution</category><category>rce</category><category>n8n</category></item><item><title>Hyperledger Fabric SDK Java Deserialization RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</link><pubDate>Wed, 29 Apr 2026 20:41:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</guid><description>The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.</description><content:encoded><![CDATA[<p>The <code>fabric-sdk-java</code> client SDK, a deprecated component of Hyperledger Fabric, contains a critical vulnerability related to insecure deserialization. Specifically, the <code>Channel.java</code> file implements <code>readObject()</code> and exposes <code>deSerializeChannel()</code> methods that call <code>ObjectInputStream.readObject()</code> on untrusted byte arrays without configuring an <code>ObjectInputFilter</code>. This omission allows an attacker to inject malicious serialized Java objects, leading to remote code execution (RCE). While <code>fabric-sdk-java</code> has been deprecated since Hyperledger Fabric v2.5 and replaced by <code>org.hyperledger.fabric:fabric-gateway</code>, organizations that have not yet migrated are still vulnerable. This issue highlights the risks associated with using deprecated software and the importance of migrating to supported versions. The vulnerability exists in versions 1.0.0 through 2.2.26.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious serialized Java object using a tool like <code>ysoserial</code>. For example, <code>java -jar ysoserial.jar CommonsCollections6 &quot;touch /tmp/pwned&quot; &gt; malicious_channel.ser</code>.</li>
<li>The attacker gains the ability to supply crafted serialized Channel bytes to the client application. This could involve compromising a local channel file.</li>
<li>The attacker injects the malicious serialized data through an application that accepts Channel bytes from external sources.</li>
<li>The vulnerable <code>deSerializeChannel()</code> method in <code>Channel.java</code> is called with the attacker-controlled byte array.</li>
<li>Inside <code>deSerializeChannel()</code>, an <code>ObjectInputStream</code> is created from the byte array.</li>
<li>The <code>readObject()</code> method of <code>ObjectInputStream</code> is called without any <code>ObjectInputFilter</code>, deserializing the malicious object.</li>
<li>The deserialization process triggers the execution of a gadget chain embedded in the malicious object.</li>
<li>The gadget chain executes arbitrary code on the server, achieving RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the server running the vulnerable <code>fabric-sdk-java</code> application. This can lead to complete system compromise, data breaches, and other malicious activities. The severity is critical due to the potential for unauthenticated remote code execution. Organizations still using the deprecated <code>fabric-sdk-java</code> are at high risk until they migrate to the supported <code>fabric-gateway</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Migrate to <code>org.hyperledger.fabric:fabric-gateway</code> immediately</strong> as the primary remediation, as it does not use Java serialization.</li>
<li>For organizations unable to migrate immediately, apply the suggested fix of adding an <code>ObjectInputFilter</code> to whitelist only expected classes as described in the advisory.</li>
<li>Implement runtime monitoring of Java deserialization to detect and prevent exploitation attempts.</li>
<li>Enable logging of deserialization events to aid in incident response.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>java</category></item><item><title>Cockpit CMS Authenticated Remote Code Execution via Code Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-cockpit-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cockpit-rce/</guid><description>Cockpit CMS is vulnerable to authenticated remote code execution via PHP code injection in the /cockpit/collections/save_collection endpoint, enabling attackers with collection management privileges to execute arbitrary commands on the server.</description><content:encoded><![CDATA[<p>Cockpit CMS is vulnerable to remote code execution due to insufficient input validation in the <code>/cockpit/collections/save_collection</code> endpoint. An authenticated attacker with collection management privileges can inject arbitrary PHP code into collection rules parameters. This vulnerability, identified as CVE-2026-34965, allows attackers to inject malicious PHP code through rule parameters. The injected code is then written directly to server-side PHP files and executed via the <code>include()</code> function, leading to arbitrary command execution on the underlying server. This poses a significant risk to organizations using Cockpit CMS, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Cockpit CMS application with valid collection management credentials.</li>
<li>Attacker navigates to the <code>/cockpit/collections/save_collection</code> endpoint.</li>
<li>Attacker crafts a malicious request to the <code>/cockpit/collections/save_collection</code> endpoint containing PHP code within collection rules parameters.</li>
<li>The application saves the attacker-supplied PHP code into a PHP file on the server.</li>
<li>The application uses the <code>include()</code> function to execute the PHP file.</li>
<li>The injected PHP code executes arbitrary commands on the underlying server, granting the attacker control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the underlying server. This can lead to complete system compromise, including data theft, modification, or deletion. Given the high CVSS score (8.8), this vulnerability poses a critical risk, especially for internet-facing Cockpit CMS installations. Organizations in any sector using Cockpit CMS are potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Cockpit CMS that addresses CVE-2026-34965 to remediate the vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Cockpit CMS Save Collection Activity</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to <code>/cockpit/collections/save_collection</code> with suspicious characters or PHP code in the request body, as detected by the Sigma rule <code>Detect PHP Code Injection in Cockpit CMS Collections</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>code-injection</category><category>cockpit-cms</category></item><item><title>Tenda W308R DNS Hijacking Vulnerability (CVE-2018-25316)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijack/</guid><description>Tenda W308R v2 V5.07.48 is vulnerable to cookie session weakness, allowing unauthenticated attackers to modify DNS settings via crafted GET requests to redirect user traffic to malicious sites.</description><content:encoded><![CDATA[<p>Tenda W308R v2 running firmware V5.07.48 is susceptible to a cookie session weakness (CVE-2018-25316) that enables unauthenticated attackers to perform DNS hijacking. This vulnerability stems from insufficient session validation. An attacker can exploit this weakness by sending specially crafted GET requests to the <code>goform/AdvSetDns</code> endpoint. The malicious request includes a crafted admin language cookie, which bypasses authentication checks and allows modification of the device&rsquo;s DNS server settings. Successful exploitation allows the attacker to redirect the router&rsquo;s DNS queries to a malicious server under their control. This poses a significant risk to end-users, as it can lead to phishing attacks, malware distribution, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda W308R v2 router running firmware V5.07.48 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>goform/AdvSetDns</code> endpoint.</li>
<li>The GET request includes a crafted &ldquo;admin language cookie&rdquo; designed to bypass authentication.</li>
<li>The router receives the malicious GET request and, due to insufficient session validation, incorrectly authenticates the attacker.</li>
<li>The router processes the malicious request, modifying the DNS server settings to attacker-controlled DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker&rsquo;s DNS server redirects users to malicious websites, potentially serving malware or phishing pages.</li>
<li>Users unknowingly interact with the malicious content, leading to data theft, system compromise, or other harmful outcomes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to control DNS resolution for all devices connected to the affected Tenda W308R v2 router. This can lead to widespread redirection to phishing sites designed to steal credentials, or to sites hosting malware that infects user devices. Given the widespread use of Tenda routers, this vulnerability could impact a large number of home and small business networks. A successful attack allows the attacker to perform man-in-the-middle attacks, eavesdrop on network traffic, and compromise connected devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Hijack Attempt</code> to identify attempts to exploit this vulnerability by monitoring for suspicious requests to the <code>/goform/AdvSetDns</code> endpoint (log source: webserver).</li>
<li>Monitor web server logs for requests containing a crafted admin language cookie to the <code>/goform/AdvSetDns</code> endpoint, indicating potential exploitation attempts (log source: webserver).</li>
<li>Apply available patches or firmware updates from Tenda to address the cookie session weakness and prevent unauthorized DNS modifications.</li>
<li>Consider replacing the affected device if a patch is unavailable, especially in high-risk environments.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25316</category><category>dns-hijacking</category><category>tenda</category><category>cookie-injection</category></item><item><title>Tenda Router DNS Hijacking via Cookie Session Weakness</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-dns-hijacking/</guid><description>Tenda W3002R/A302/W309R routers with firmware V5.07.64_en are vulnerable to unauthenticated DNS hijacking, where attackers exploit a cookie session weakness to modify DNS settings via crafted GET requests.</description><content:encoded><![CDATA[<p>Tenda W3002R, A302, and W309R wireless routers running firmware version V5.07.64_en are susceptible to a cookie session weakness (CVE-2018-25317). This vulnerability allows unauthenticated attackers to remotely modify DNS settings on the affected devices. The attack exploits insufficient session validation, enabling malicious actors to inject commands and redirect user traffic to attacker-controlled DNS servers. This poses a significant risk as it can lead to phishing attacks, malware distribution, and credential theft. Exploitation is straightforward, requiring only a crafted HTTP GET request, making it accessible to unsophisticated attackers. The vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Tenda router with firmware V5.07.64_en.</li>
<li>The attacker crafts an HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a malicious <code>admin language</code> cookie designed to bypass session validation.</li>
<li>The attacker injects modified DNS server addresses into the GET request parameters (primary DNS and secondary DNS).</li>
<li>The vulnerable router processes the malicious GET request without proper session validation.</li>
<li>The router updates its DNS settings to the attacker-specified DNS servers.</li>
<li>Users connected to the compromised router now resolve domain names through the attacker&rsquo;s DNS server.</li>
<li>The attacker can redirect user traffic to malicious websites or intercept sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25317 allows attackers to perform DNS hijacking on vulnerable Tenda routers, potentially affecting all connected users. By controlling the DNS server, attackers can redirect users to phishing sites, distribute malware, or intercept sensitive communications. Given the ease of exploitation, a large number of routers could be compromised, leading to widespread disruption and data theft. The severity is heightened because no authentication is required to change the DNS settings.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Tenda Router DNS Setting Modification</code> to monitor web server logs for requests to the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>Apply network-level filtering to block connections to known malicious DNS servers based on threat intelligence feeds.</li>
<li>Although no firmware update is available, consider replacing end-of-life Tenda routers (W3002R/A302/W309R with V5.07.64_en) with more secure models.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25317</category><category>dns-hijacking</category><category>router-vulnerability</category></item><item><title>Free Download Manager 2.0 Built 417 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-fdm-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fdm-buffer-overflow/</guid><description>Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>Free Download Manager (FDM) version 2.0 Built 417 is susceptible to a local buffer overflow vulnerability (CVE-2018-25304) within its URL import functionality. This vulnerability, discovered and reported by VulnCheck, allows an attacker to craft a malicious URL file. When a user imports this specially crafted file through the &ldquo;File &gt; Import &gt; Import lists of downloads&rdquo; menu, the application attempts to process the &lsquo;Location&rsquo; header response, triggering a buffer overflow. This overflow overwrites the Structured Exception Handler (SEH) chain, enabling the attacker to execute arbitrary code within the context of the FDM process. This vulnerability can be exploited locally by tricking a user into importing a malicious file.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious <code>.url</code> file containing an overly long <code>Location</code> header value designed to cause a buffer overflow.</li>
<li>The victim is convinced to download the malicious <code>.url</code> file (e.g., through social engineering).</li>
<li>The victim opens Free Download Manager 2.0 Built 417.</li>
<li>The victim navigates to &ldquo;File &gt; Import &gt; Import lists of downloads&rdquo; within FDM.</li>
<li>The victim selects the downloaded malicious <code>.url</code> file and initiates the import process.</li>
<li>FDM parses the malicious <code>.url</code> file and attempts to process the long <code>Location</code> header.</li>
<li>The excessively long <code>Location</code> header causes a buffer overflow, overwriting the SEH chain.</li>
<li>When an exception is triggered (due to the overflow), the overwritten SEH chain is used to redirect execution to attacker-controlled code, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows an attacker to execute arbitrary code on the victim&rsquo;s system with the privileges of the Free Download Manager process. This could lead to complete system compromise, data theft, or installation of malware. While specific victim counts are unavailable, the vulnerability poses a significant risk to users of Free Download Manager 2.0 Built 417.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for process creation events originating from Free Download Manager after importing a <code>.url</code> file to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Free Download Manager Suspicious Process Creation After Import&rdquo;).</li>
<li>Implement file integrity monitoring (FIM) on the Free Download Manager executable directory to detect unauthorized modifications potentially related to exploitation.</li>
<li>Consider using application control solutions to restrict the execution of unsigned or untrusted code within the Free Download Manager process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category><category>cve-2018-25304</category></item><item><title>AgentFlow Arbitrary Code Execution via Pipeline Path Manipulation (CVE-2026-7466)</title><link>https://feed.craftedsignal.io/briefs/2026-04-agentflow-rce/</link><pubDate>Wed, 29 Apr 2026 19:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-agentflow-rce/</guid><description>AgentFlow is vulnerable to arbitrary code execution (CVE-2026-7466) by manipulating the `pipeline_path` parameter in POST requests to `/api/runs` and `/api/runs/validate`, allowing attackers to execute arbitrary Python code.</description><content:encoded><![CDATA[<p>AgentFlow is susceptible to an arbitrary code execution vulnerability identified as CVE-2026-7466. This flaw stems from insufficient validation of the <code>pipeline_path</code> parameter within the <code>/api/runs</code> and <code>/api/runs/validate</code> endpoints. By crafting malicious POST requests and supplying a user-controlled <code>pipeline_path</code>, an attacker can induce the AgentFlow API to load and execute arbitrary Python pipeline files present on the server&rsquo;s filesystem. Successful exploitation leads to code execution within the security context of the user running AgentFlow, potentially granting the attacker full control over the affected system. This vulnerability poses a significant threat to organizations utilizing AgentFlow, as it can lead to data breaches, system compromise, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an AgentFlow instance running a vulnerable version.</li>
<li>Attacker crafts a POST request to the <code>/api/runs</code> endpoint, including a <code>pipeline_path</code> parameter.</li>
<li>The <code>pipeline_path</code> parameter is set to the path of a malicious Python file already existing on the AgentFlow server (or uploaded previously through other means).</li>
<li>The attacker sends the malicious POST request to the <code>/api/runs</code> endpoint.</li>
<li>AgentFlow processes the request without properly validating the <code>pipeline_path</code>.</li>
<li>AgentFlow loads and executes the Python file specified in the <code>pipeline_path</code>.</li>
<li>The attacker-controlled Python code executes with the privileges of the AgentFlow process.</li>
<li>The attacker achieves arbitrary code execution, potentially leading to complete system compromise, data exfiltration, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7466 allows an attacker to execute arbitrary code on the AgentFlow server. This can lead to a complete compromise of the system, including the theft of sensitive data, modification of critical system files, or the installation of backdoors for persistent access. The severity of the impact depends on the privileges of the user account running AgentFlow, but in many cases, it can lead to full system administrator access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement input validation and sanitization on the <code>pipeline_path</code> parameter within the <code>/api/runs</code> and <code>/api/runs/validate</code> endpoints to prevent arbitrary file loading and execution.</li>
<li>Monitor web server logs for POST requests to <code>/api/runs</code> and <code>/api/runs/validate</code> containing suspicious <code>pipeline_path</code> values (see example Sigma rule below).</li>
<li>Restrict file system permissions to limit the ability of the AgentFlow user to read and execute arbitrary Python files.</li>
<li>Apply available patches or updates for AgentFlow as soon as they are released to address this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7466</category><category>rce</category><category>code-injection</category></item><item><title>cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cpanel-auth-bypass/</link><pubDate>Wed, 29 Apr 2026 16:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cpanel-auth-bypass/</guid><description>An authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>On April 28, 2026, a critical authentication bypass vulnerability (CVE-2026-41940) was disclosed affecting cPanel and WHM. This vulnerability impacts versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5. The vulnerability exists within the login flow, allowing unauthenticated remote attackers to bypass authentication and gain unauthorized access to the control panel. Successful exploitation grants attackers complete control over the affected cPanel and WHM instances, potentially leading to data theft, server compromise, and further malicious activities. This vulnerability poses a significant risk to web hosting providers and their customers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the cPanel/WHM login page, exploiting the authentication bypass vulnerability.</li>
<li>The vulnerable cPanel/WHM version fails to properly validate the request, allowing the attacker to bypass the login process.</li>
<li>The attacker gains unauthorized access to the cPanel/WHM interface.</li>
<li>The attacker enumerates the server to identify valuable files, directories, and database configurations.</li>
<li>The attacker leverages the compromised cPanel/WHM access to upload malicious scripts or binaries.</li>
<li>The attacker executes uploaded payloads to establish persistent access, such as a web shell.</li>
<li>The attacker uses the web shell to perform arbitrary commands on the server, including escalating privileges.</li>
<li>The attacker exfiltrates sensitive data, defaces websites, or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of cPanel and WHM servers. This can result in data breaches, website defacement, and denial-of-service attacks. The vulnerability affects a wide range of cPanel and WHM installations, potentially impacting thousands of web hosting providers and their customers. The high CVSS score (9.8) reflects the severity of the risk and the ease with which it can be exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade cPanel and WHM installations to versions 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, or 11.136.0.5, or later to patch CVE-2026-41940.</li>
<li>Monitor web server logs for unusual activity and unauthorized access attempts to the cPanel/WHM interface by deploying the Sigma rule <code>DetectCpanelAuthBypassAccess</code>.</li>
<li>Implement strict access control policies to limit access to cPanel/WHM administrative interfaces and monitor the user activity by deploying the Sigma rule <code>DetectCpanelAccountManipulation</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>authentication-bypass</category><category>CVE-2026-41940</category><category>webserver</category></item><item><title>Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-spring-boot-vulns/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spring-boot-vulns/</guid><description>Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.</description><content:encoded><![CDATA[<p>A set of critical vulnerabilities has been discovered in Spring Boot, a widely used Java framework for building web applications and backend services. These vulnerabilities, including CVE-2026-40976 (CVSS 9.1), CVE-2026-40973 (CVSS 7.0), and CVE-2026-40972 (CVSS 7.5), pose a significant threat to organizations using affected versions (specifically versions before 4.0.6, 3.5.14, 3.4.16, 3.3.19, and 2.7.33). Successful exploitation could lead to unauthorized access, session hijacking, and remote code execution, impacting the confidentiality, integrity, and availability of critical business systems. The initial advisory was released by CCB Belgium on April 28, 2026, urging immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (CVE-2026-40976 - Authentication Bypass):</strong> An attacker sends a crafted HTTP request to a vulnerable Spring Boot application endpoint.</li>
<li><strong>Exploit Default Configuration:</strong> If the application is servlet-based, relies on the default Spring Security filter chain, depends on spring-boot-actuator-autoconfigure, and does not depend on spring-boot-health, the default web security configuration fails to enforce authorization.</li>
<li><strong>Unauthorized Access:</strong> Due to the authorization bypass, the attacker gains unauthorized access to all application endpoints without proper authentication.</li>
<li><strong>Session Hijacking (CVE-2026-40973):</strong> A local attacker exploits the vulnerability to take control of the ApplicationTemp directory.</li>
<li><strong>Code Execution (CVE-2026-40973):</strong> Once in control of the ApplicationTemp directory, the attacker can potentially execute arbitrary code within the context of the application.</li>
<li><strong>Timing Attack (CVE-2026-40972):</strong> An attacker on the same network conducts a timing attack against the DevTools remote secret.</li>
<li><strong>Remote Code Execution (CVE-2026-40972):</strong> By successfully exploiting the timing attack, the attacker can potentially achieve remote code execution on the vulnerable server.</li>
<li><strong>Impact:</strong> The attacker gains full control of the system, allowing for data exfiltration, system compromise, and operational downtime.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these Spring Boot vulnerabilities can lead to significant damage, including unauthorized access to sensitive data, complete system compromise, and extended operational downtime. The potential number of victims is vast, considering the widespread use of Spring Boot in various sectors including finance, healthcare, and e-commerce. If an attacker successfully exploits these vulnerabilities, they could steal sensitive customer data, disrupt critical business operations, or deploy ransomware, resulting in significant financial losses and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Spring Boot applications to the latest versions (&gt;=4.0.6, &gt;=3.5.14, &gt;=3.4.16, &gt;=3.3.19, &gt;=2.7.33) to address CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Access to Actuator Endpoints&rdquo; to identify potential exploitation attempts targeting CVE-2026-40976 by monitoring access to sensitive actuator endpoints.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity as recommended by the CCB.</li>
<li>Investigate and remediate any potentially compromised systems following the patching process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spring-boot</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category><category>session-hijacking</category></item><item><title>LLM-Based Compromised User Triage</title><link>https://feed.craftedsignal.io/briefs/2024-05-llm-compromised-user/</link><pubDate>Tue, 28 Apr 2026 17:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-llm-compromised-user/</guid><description>This rule correlates multiple security alerts involving the same user, analyzes them with an LLM, and flags potentially compromised accounts based on MITRE tactics, geographic anomalies, and multi-host activity, helping analysts prioritize users exhibiting indicators of credential theft or unauthorized access.</description><content:encoded><![CDATA[<p>This Elastic Security rule, designed for Elastic Cloud deployments 9.3.0 and later, leverages an Elastic Managed LLM to analyze correlated security alerts and identify potentially compromised user accounts. The rule aggregates alerts associated with a single user, examining patterns, MITRE ATT&amp;CK tactic progression, unusual geographic locations, and multi-host activity. The LLM then provides a verdict (compromised, benign, or suspicious) and a confidence score. It aims to reduce analyst workload by surfacing users exhibiting indicators of credential theft or unauthorized access and is intended to be used in conjunction with other detection mechanisms to provide a higher-order analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Multiple security alerts are triggered across various data sources, such as endpoint activity, network traffic, and authentication logs.</li>
<li>Alerts are aggregated and correlated by user.name and user.id, filtering out system accounts and noisy rule types.</li>
<li>The rule extracts key alert details, including rule names, threat tactics, techniques, affected hosts, source IPs, and event datasets.</li>
<li>An alert summary is constructed, including the user&rsquo;s name, email, number of alerts, distinct rules triggered, affected hosts, time window, and maximum risk score.</li>
<li>The LLM analyzes the alert summary, considering multi-host activity, credential access alerts, unusual source IPs, and tactic progression.</li>
<li>The LLM provides a verdict (TP, FP, or SUSPICIOUS), a confidence score, and a brief summary explaining the assessment.</li>
<li>The rule filters results to surface only compromised or suspicious accounts with a confidence score above 0.7.</li>
<li>ECS fields are mapped for timeline visibility and alert exclusion and the analyst is presented with a high-confidence alert.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using compromised credentials can lead to unauthorized access to sensitive data, lateral movement within the network, and potentially data exfiltration or ransomware deployment. This detection rule helps to quickly identify compromised user accounts, allowing security teams to respond promptly and prevent further damage. The rule reduces the amount of time analysts spend manually triaging alerts and helps them prioritize high-risk users based on an LLM&rsquo;s assessment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that your Elastic Cloud deployment is running version 9.3.0 or later to leverage the ES|QL COMPLETION command with Elastic&rsquo;s managed LLM.</li>
<li>Review the <code>Esql.summary</code> field in the generated alerts to understand the LLM&rsquo;s assessment of why the user was flagged.</li>
<li>Investigate alerts where the <code>Esql.confidence</code> score is above 0.9, as these indicate strong indicators of compromise.</li>
<li>Examine the <code>Esql.kibana_alert_rule_name_values</code> and <code>Esql.kibana_alert_rule_threat_tactic_name_values</code> to understand which detection rules triggered and what MITRE ATT&amp;CK tactics were observed.</li>
<li>Use the provided investigation steps in the rule&rsquo;s note to conduct a thorough investigation, checking for unusual login times, locations, password resets, and MFA changes.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>Domain: Identity</category><category>Domain: LLM</category><category>Use Case: Threat Detection</category><category>Use Case: Identity and Access Audit</category><category>Resources: Investigation Guide</category><category>Rule Type: Higher-Order Rule</category></item><item><title>D-Link DIR-825M Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</link><pubDate>Tue, 28 Apr 2026 15:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</guid><description>D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability exists in D-Link DIR-825M router version 1.1.12. The vulnerability is located within the <code>sub_414BA8</code> function of the <code>/boafrm/formWanConfigSetup</code> file. An attacker can exploit this flaw by manipulating the <code>submit-url</code> argument, leading to arbitrary code execution on the device. This vulnerability is remotely exploitable, and a proof-of-concept exploit is publicly available, increasing the risk of widespread attacks. Exploitation does not require authentication by default, and could allow an attacker to gain complete control over the device. This poses a significant threat to home and small business networks relying on this router model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-825M router running firmware version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
<li>The attacker includes the <code>submit-url</code> argument in the POST request, injecting a buffer overflow payload.</li>
<li>The crafted payload overflows the buffer in the <code>sub_414BA8</code> function during the processing of the <code>submit-url</code> argument.</li>
<li>The buffer overflow overwrites critical memory regions, including the return address.</li>
<li>When the <code>sub_414BA8</code> function returns, control is redirected to the attacker-controlled address.</li>
<li>The attacker&rsquo;s payload executes arbitrary code, potentially downloading and executing a secondary payload.</li>
<li>The attacker gains remote shell access to the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the D-Link DIR-825M router. This can lead to complete compromise of the device, allowing the attacker to eavesdrop on network traffic, modify router settings, or use the router as a botnet node for further malicious activities. Given the widespread use of D-Link routers in home and small business networks, a successful attack could compromise a large number of devices and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from D-Link to patch CVE-2026-7289.</li>
<li>Deploy the following Sigma rule to detect suspicious POST requests to <code>/boafrm/formWanConfigSetup</code> with overly long <code>submit-url</code> parameters.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>dlink</category><category>cve</category></item><item><title>Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</guid><description>A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda HG3 version 2.0. The vulnerability exists within the <code>formUploadConfig</code> function of the <code>/boaform/formIPv6Routing</code> file. A remote attacker can exploit this by manipulating the <code>destNet</code> argument, potentially leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-7151, has a publicly available exploit, increasing the risk of exploitation. This poses a significant threat to users of Tenda HG3 v2.0 routers, potentially allowing attackers to gain unauthorized access and control over the device. The CVSS v3.1 score is rated as 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda HG3 v2.0 router with default or known credentials, or no authentication at all.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/boaform/formIPv6Routing</code>.</li>
<li>The request targets the <code>formUploadConfig</code> function.</li>
<li>The <code>destNet</code> argument within the HTTP POST data is manipulated with a string exceeding the buffer size.</li>
<li>The <code>formUploadConfig</code> function processes the oversized <code>destNet</code> argument without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions on the stack.</li>
<li>The attacker gains arbitrary code execution on the device by overwriting the return address or other critical data on the stack.</li>
<li>The attacker can then leverage this to gain full control of the device, potentially modifying settings, injecting malware, or using it as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda HG3 v2.0 router. This could lead to complete compromise of the device, allowing the attacker to monitor network traffic, change router settings, or use the device as a launchpad for further attacks against other devices on the network. Given the potential for widespread exploitation due to the publicly available exploit, a large number of Tenda HG3 v2.0 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/boaform/formIPv6Routing</code> with excessively long <code>destNet</code> parameters to detect potential exploit attempts (see example Sigma rule below).</li>
<li>Implement rate limiting for requests to <code>/boaform/formIPv6Routing</code> to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches or firmware updates from Tenda to address CVE-2026-7151 on vulnerable HG3 2.0 devices.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting the <code>destNet</code> parameter in <code>/boaform/formIPv6Routing</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7151</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-rce/</link><pubDate>Tue, 28 Apr 2026 09:17:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-rce/</guid><description>Totolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7241, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This vulnerability resides within the CGI Handler component, specifically in the <code>setWiFiBasicCfg</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands by manipulating the <code>wifiOff</code> argument. The vulnerability has been publicly disclosed, increasing the risk of exploitation. This poses a significant threat to users of the affected router model, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Totolink A8000RU router running firmware version 7.1cu.643_b20200521.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request targets the <code>setWiFiBasicCfg</code> function.</li>
<li>The attacker injects malicious OS commands into the <code>wifiOff</code> argument of the HTTP request.</li>
<li>The CGI handler processes the request without proper sanitization of the <code>wifiOff</code> argument.</li>
<li>The injected OS commands are executed by the system with the privileges of the web server.</li>
<li>The attacker gains remote shell access or performs other malicious actions, such as modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected Totolink A8000RU router. This can lead to complete compromise of the device, potentially enabling the attacker to eavesdrop on network traffic, modify router configuration, or use the router as a node in a botnet. Given the widespread use of Totolink routers, a successful attack could impact numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Totolink A8000RU Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts targeting the vulnerable endpoint.</li>
<li>Apply the Sigma rule &ldquo;Detect Suspicious CGI Request Arguments&rdquo; to identify unusual commands in cgi requests.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> with suspicious characters or commands in the <code>wifiOff</code> parameter, as this is the attack vector described in CVE-2026-7241.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7241</category><category>command-injection</category><category>router</category></item><item><title>D-Link DI-8100 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</link><pubDate>Tue, 28 Apr 2026 09:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</guid><description>A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7248, affects the D-Link DI-8100 router, specifically version 16.07.26A1. The vulnerability resides within the <code>tgfile_htm</code> function of the <code>tgfile.htm</code> file, a component of the CGI endpoint. By crafting a malicious request targeting the <code>fn</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability is particularly concerning as a proof-of-concept exploit has been publicly released, increasing the likelihood of exploitation. Routers are often targeted due to their exposure to the internet and the potential to compromise entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DI-8100 router running firmware version 16.07.26A1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tgfile.htm</code> CGI endpoint.</li>
<li>The malicious request includes an overly long string in the <code>fn</code> argument.</li>
<li>The router&rsquo;s web server processes the request and passes the <code>fn</code> argument to the <code>tgfile_htm</code> function.</li>
<li>The <code>tgfile_htm</code> function fails to properly validate the length of the <code>fn</code> argument.</li>
<li>A buffer overflow occurs when the overly long <code>fn</code> argument is copied into a fixed-size buffer.</li>
<li>The buffer overflow overwrites adjacent memory, potentially including return addresses or other critical data.</li>
<li>The attacker gains arbitrary code execution on the router, potentially allowing them to take full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to remotely execute arbitrary code on the D-Link DI-8100 router. This could lead to a complete compromise of the device, allowing the attacker to intercept network traffic, modify router settings, or use the router as a launchpad for further attacks against other devices on the network. Given the public availability of an exploit, widespread exploitation is possible, potentially affecting numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for abnormally long <code>fn</code> parameters in requests to <code>/tgfile.htm</code> using the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement rate limiting on HTTP requests to the router&rsquo;s web interface to mitigate brute-force exploitation attempts.</li>
<li>Since the source material only identifies a vulnerability, without a patch, consider replacing the affected device.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7248</category><category>buffer-overflow</category><category>d-link</category><category>router</category></item><item><title>Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-command-injection/</link><pubDate>Tue, 28 Apr 2026 09:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-command-injection/</guid><description>A critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-7244, has been discovered in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This flaw resides within the CGI handler, specifically in the <code>setWiFiEasyGuestCfg</code> function located in the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>merge</code> argument, a remote attacker can inject and execute arbitrary operating system commands on the affected device. The vulnerability is remotely exploitable and a proof-of-concept exploit has been publicly released, increasing the risk of widespread exploitation. This poses a significant threat as it allows for complete control over the device, potentially leading to data breaches, network compromise, and botnet recruitment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint on the Totolink A8000RU router.</li>
<li>The request targets the <code>setWiFiEasyGuestCfg</code> function.</li>
<li>The attacker crafts the request to include a payload in the <code>merge</code> argument designed to inject an OS command.</li>
<li>The <code>cstecgi.cgi</code> script processes the request and passes the <code>merge</code> argument to a system call without proper sanitization.</li>
<li>The injected OS command is executed with the privileges of the web server.</li>
<li>The attacker gains arbitrary code execution on the router&rsquo;s operating system.</li>
<li>The attacker can then install malware, change router settings, or use the router as a pivot point to attack other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7244 grants an attacker complete control over the vulnerable Totolink A8000RU router. This can lead to a variety of malicious activities, including data exfiltration, denial-of-service attacks, and the installation of persistent backdoors. Given the availability of a public exploit, a large number of devices could be compromised quickly. This could result in widespread botnet infections, impacting home users and small businesses relying on these routers for network connectivity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> with suspicious parameters in the query string, especially related to the <code>merge</code> argument to detect exploitation attempts (see rule: &ldquo;Detect Totolink A8000RU Command Injection Attempt&rdquo;).</li>
<li>Implement network intrusion detection system (NIDS) rules to identify malicious payloads being sent to the affected endpoint (see rule: &ldquo;Detect Totolink A8000RU Command Injection - Network&rdquo;).</li>
<li>Apply the Sigma rule &ldquo;Detect Totolink A8000RU Command Injection in Logs&rdquo; to your SIEM to identify successful command injection attempts based on web server logs.</li>
<li>Monitor for unusual process execution originating from the web server process, indicating potential exploitation.</li>
<li>Unfortunately, a patch is not available so consider migrating to a more secure router.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command injection</category><category>router vulnerability</category><category>cve-2026-7244</category></item><item><title>VMware Tanzu Spring Boot Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-tanzu-spring-boot-vulns/</link><pubDate>Tue, 28 Apr 2026 08:31:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tanzu-spring-boot-vulns/</guid><description>Multiple vulnerabilities in VMware Tanzu Spring Boot allow attackers to execute arbitrary code, bypass security measures, manipulate or disclose sensitive data, or hijack authenticated users.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist in VMware Tanzu Spring Boot that could be exploited by malicious actors. While the specific CVEs and technical details of these vulnerabilities are not disclosed, the potential impact is significant. An attacker could leverage these vulnerabilities to achieve arbitrary code execution, circumvent security controls, manipulate or disclose confidential data, and even hijack authenticated user sessions. Given the widespread use of Spring Boot in enterprise applications, these vulnerabilities pose a substantial risk to organizations utilizing this framework. Defenders should prioritize identifying and mitigating these vulnerabilities to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable endpoint in a Tanzu Spring Boot application.</li>
<li>The attacker crafts a malicious request designed to exploit a vulnerability, such as a deserialization flaw or an SQL injection point.</li>
<li>The malicious request bypasses input validation or authentication mechanisms due to the vulnerability.</li>
<li>The exploited vulnerability allows the attacker to execute arbitrary code within the context of the Spring Boot application.</li>
<li>The attacker leverages the code execution to gain access to sensitive data, such as database credentials or API keys.</li>
<li>The attacker uses the compromised credentials to access other systems or resources within the network.</li>
<li>The attacker escalates privileges within the Spring Boot application or the underlying operating system.</li>
<li>The attacker establishes persistence and maintains long-term access to the compromised system, potentially leading to data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to a wide range of damaging outcomes. Attackers could gain unauthorized access to sensitive data, disrupt critical business processes, or deploy ransomware. The lack of specific details regarding the number of victims and targeted sectors makes it difficult to quantify the precise impact, but the potential for widespread disruption is considerable, especially given the prevalence of Spring Boot applications. The ability to execute arbitrary code provides attackers with significant control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate Tanzu Spring Boot applications for unusual process execution using the rule &ldquo;Detect Suspicious Spring Boot Process Execution&rdquo;.</li>
<li>Monitor web server logs for suspicious requests that could be indicative of vulnerability exploitation with the rule &ldquo;Detect Malicious Request to Spring Boot Application&rdquo;.</li>
<li>Implement strict input validation and output encoding measures in Tanzu Spring Boot applications to prevent common web application vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vmware</category><category>spring-boot</category><category>vulnerability</category></item><item><title>Multiple Vulnerabilities in Atlassian Products</title><link>https://feed.craftedsignal.io/briefs/2026-04-atlassian-vulns/</link><pubDate>Tue, 28 Apr 2026 08:31:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-atlassian-vulns/</guid><description>Multiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, and Jira allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist in Atlassian&rsquo;s Bamboo, Bitbucket, Confluence, and Jira products. While specific CVEs are not detailed in this advisory, the potential impact is significant. An attacker exploiting these vulnerabilities could achieve arbitrary code execution, allowing for complete system compromise. They could also bypass security measures, potentially disabling logging or other security controls. Data manipulation and disclosure could lead to sensitive information compromise and unauthorized modifications. Cross-site scripting (XSS) attacks could be leveraged to steal user credentials or perform actions on behalf of unsuspecting users. Defenders need to ensure the Atlassian suite is fully patched and monitored.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker identifies a vulnerable Atlassian product instance (Bamboo, Bitbucket, Confluence, or Jira) accessible over the network.</li>
<li><strong>Vulnerability Exploitation:</strong> The attacker leverages an unknown vulnerability to inject malicious code into the application, possibly through a crafted HTTP request.</li>
<li><strong>Code Execution:</strong> The injected code executes within the context of the Atlassian application, allowing the attacker to run arbitrary commands on the server.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages the initial code execution to escalate privileges, potentially gaining root or administrator access.</li>
<li><strong>Defense Evasion:</strong> The attacker attempts to disable security logging or other monitoring mechanisms to avoid detection.</li>
<li><strong>Data Manipulation/Exfiltration:</strong> The attacker accesses sensitive data stored within the Atlassian application or connected databases, manipulating or exfiltrating it for malicious purposes.</li>
<li><strong>Lateral Movement:</strong> Using compromised credentials or established footholds, the attacker moves laterally to other systems within the network.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as deploying ransomware, stealing intellectual property, or disrupting business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage, including complete compromise of Atlassian servers, data breaches, and disruption of critical business processes. The number of potential victims is substantial, as these Atlassian products are widely used across various industries. The impact ranges from data loss and financial damage to reputational harm and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to detect potential exploitation attempts targeting Atlassian products.</li>
<li>Monitor web server logs for suspicious activity, especially HTTP requests targeting Atlassian applications, to detect potential vulnerability exploitation.</li>
<li>Enable and review audit logs within Atlassian products (Bamboo, Bitbucket, Confluence, Jira) for suspicious activity.</li>
<li>Implement network segmentation to limit the potential impact of a successful breach originating from a compromised Atlassian server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>atlassian</category><category>vulnerability</category><category>code-execution</category><category>xss</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-cmd-injection/</link><pubDate>Tue, 28 Apr 2026 08:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-cmd-injection/</guid><description>CVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7240, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This flaw resides within the CGI Handler component, specifically in the <code>setVpnAccountCfg</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By exploiting this vulnerability, a remote attacker can inject arbitrary operating system commands by manipulating the <code>User</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat as it allows complete control of the affected device, potentially leading to network compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Totolink A8000RU router running firmware version 7.1cu.643_b20200521 accessible via the web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted request includes the <code>setVpnAccountCfg</code> function call with a payload injected into the <code>User</code> argument. The payload contains OS commands to be executed on the router.</li>
<li>The router&rsquo;s CGI Handler processes the request without proper sanitization of the <code>User</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the web server process.</li>
<li>The attacker gains remote shell access to the router.</li>
<li>The attacker leverages the compromised router to pivot within the network, potentially accessing sensitive data or other internal systems.</li>
<li>The attacker could modify the router&rsquo;s configuration, intercept network traffic, or use it as a launching point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7240 allows a remote, unauthenticated attacker to execute arbitrary commands on the affected Totolink A8000RU router. This could lead to a complete compromise of the device, potentially exposing sensitive information, enabling unauthorized network access, and facilitating further attacks within the network. Given the ease of exploitation and the availability of public exploits, organizations using this router model are at high risk of experiencing significant security breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink A8000RU Command Injection Attempt</code> to identify exploitation attempts against vulnerable Totolink routers. Enable webserver logging to capture the necessary request data.</li>
<li>Apply the Sigma rule <code>Detect Totolink A8000RU Malicious User Agent</code> to detect potential exploit attempts based on modified User-Agent headers.</li>
<li>Monitor webserver logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command sequences in the <code>cs-uri-query</code> field, indicative of command injection attempts.</li>
<li>Given the public availability of exploit code, organizations using the Totolink A8000RU 7.1cu.643_b20200521 are advised to replace the device if a patch is not available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7240</category><category>command-injection</category><category>totolink</category><category>router</category><category>cgi</category></item><item><title>Tenda HG3 2.0 Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</link><pubDate>Mon, 27 Apr 2026 22:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</guid><description>Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.</description><content:encoded><![CDATA[<p>Tenda HG3 2.0 is vulnerable to a command injection vulnerability (CVE-2026-7160) affecting the formTracert function in the /boaform/formTracert file. A remote attacker can exploit this by manipulating the datasize argument to inject arbitrary commands into the system. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Public disclosure and potential exploitation make this a critical issue for users of the Tenda HG3 2.0 router. Successful exploitation allows an attacker to execute arbitrary commands on the device, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the /boaform/formTracert endpoint.</li>
<li>The malicious request includes a manipulated datasize argument designed to inject a command.</li>
<li>The web server processes the request and passes the manipulated datasize argument to the formTracert function.</li>
<li>The formTracert function fails to properly sanitize the input, allowing the injected command to be executed by the system.</li>
<li>The injected command executes with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the Tenda HG3 2.0 router. This can lead to complete compromise of the device, including modification of router settings, interception of network traffic, and potential use of the router as a botnet node. Given the high base score of 8.8, this poses a significant risk to affected users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-7160.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/boaform/formTracert</code> with unusual <code>datasize</code> parameters, as covered by the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo;.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block exploit attempts targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-7160</category><category>tenda</category></item><item><title>Apache MINA Arbitrary Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</link><pubDate>Mon, 27 Apr 2026 16:09:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</guid><description>A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.</description><content:encoded><![CDATA[<p>A critical arbitrary code execution vulnerability, CVE-2026-41635, has been identified in Apache MINA, an open-source network application framework. The vulnerability affects versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5. The flaw lies within the AbstractIoBuffer.resolveClass() method, where a branch lacks class validation, bypassing the classname allowlist. This allows remote attackers with low privileges to execute arbitrary code on systems using Apache MINA when the IoBuffer.getObject() method is called. Successful exploitation can lead to full system compromise, data exfiltration, and further attacks on interconnected systems. It is imperative that organizations using Apache MINA apply the necessary patches immediately to mitigate this critical risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable application using Apache MINA versions 2.0.0-2.0.27, 2.1.0-2.1.10, or 2.2.0-2.2.5.</li>
<li>The attacker crafts a malicious payload containing serialized Java objects designed to exploit the class validation bypass in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The attacker sends a network request to the vulnerable application that triggers the <code>IoBuffer.getObject()</code> method.</li>
<li>The <code>IoBuffer.getObject()</code> method deserializes the attacker-controlled data without proper class validation due to the flaw in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The malicious serialized object executes arbitrary code within the context of the application.</li>
<li>The attacker gains control of the application server.</li>
<li>The attacker uses their access to move laterally within the network.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41635 allows attackers to execute arbitrary code on systems utilizing vulnerable versions of Apache MINA. This can lead to a full compromise of the affected system, including data exfiltration, denial of service, or further attacks on interconnected systems. The vulnerability is remotely exploitable with low privileges, increasing the potential for widespread impact across various sectors relying on Apache MINA for network communication. A successful attack poses a high risk to the confidentiality, integrity, and availability of affected systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Apache MINA to the latest version to remediate CVE-2026-41635, as recommended by the vendor advisory (<a href="https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)">https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)</a>.</li>
<li>Implement network monitoring to detect suspicious activity related to deserialization attempts, as suggested by the CCB&rsquo;s recommendation to upscale monitoring capabilities.</li>
<li>Deploy the Sigma rule &ldquo;Detect Apache MINA Vulnerable Class Deserialization Attempt&rdquo; to identify potential exploitation attempts based on suspicious class names in network traffic.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apache-mina</category><category>rce</category><category>deserialization</category><category>cve-2026-41635</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</link><pubDate>Mon, 27 Apr 2026 09:19:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7101, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromWrlclientSet</code> function within the <code>/goform/WrlclientSet</code> file, which is part of the router&rsquo;s httpd component. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to home and small business networks using the affected Tenda router model, potentially leading to complete device compromise and unauthorized network access. The vulnerability was published on 2026-04-27 and is tracked by VulDB.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda F456 router running firmware version 1.0.0.5.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>The crafted request includes an oversized payload designed to overflow the buffer in the <code>fromWrlclientSet</code> function.</li>
<li>The <code>httpd</code> process attempts to process the request without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including critical program data and execution pointers.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially including shell commands or custom malware.</li>
<li>The attacker achieves complete control of the router, potentially enabling network reconnaissance, data exfiltration, or further attacks on the local network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda F456 router. This can lead to complete device compromise, allowing the attacker to control network traffic, modify router settings, or use the compromised device as a pivot point for further attacks within the network. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploitation could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched firmware version if available from the vendor.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/goform/WrlclientSet</code> endpoint using the provided Sigma rule.</li>
<li>Implement an IPS rule to detect and block exploit attempts targeting CVE-2026-7101.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7101</category><category>buffer-overflow</category><category>router</category><category>tenda</category><category>remote-code-execution</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</link><pubDate>Mon, 27 Apr 2026 04:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-bo/</guid><description>A buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 in the `fromGstDhcpSetSer` function, allowing remote attackers to execute arbitrary code by manipulating the 'dips' argument via a crafted HTTP request to `/goform/GstDhcpSetSer`.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7081, affects Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromGstDhcpSetSer</code> function within the <code>/goform/GstDhcpSetSer</code> file, a component of the device&rsquo;s httpd service. Successful exploitation allows a remote attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread exploitation. This vulnerability poses a significant threat as it can lead to complete compromise of the affected device, potentially allowing attackers to gain unauthorized access to the network, steal sensitive information, or use the device as part of a botnet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda F456 router (version 1.0.0.5) exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/GstDhcpSetSer</code> endpoint.</li>
<li>The HTTP request includes the <code>dips</code> argument, which is intentionally oversized to trigger the buffer overflow.</li>
<li>The vulnerable <code>fromGstDhcpSetSer</code> function processes the request without proper bounds checking.</li>
<li>The oversized <code>dips</code> argument overwrites adjacent memory regions on the stack.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address with an address pointing to attacker-controlled code.</li>
<li>The <code>fromGstDhcpSetSer</code> function returns, causing execution to jump to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the httpd process, potentially leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F456 router. This can result in complete device compromise, including the ability to modify device settings, intercept network traffic, and potentially use the compromised device as a pivot point for further attacks within the network. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, making this a significant security concern.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/GstDhcpSetSer</code> with unusually long <code>dips</code> parameter values to detect potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule <code>Detect Tenda F456 Buffer Overflow Attempt</code> to identify malicious HTTP requests.</li>
<li>Since no patch is available, consider replacing the affected Tenda F456 routers (version 1.0.0.5) with more secure alternatives.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer_overflow</category><category>router</category></item><item><title>Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)</title><link>https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</guid><description>CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.</description><content:encoded><![CDATA[<p>A command injection vulnerability, CVE-2026-6992, affects the Linksys MR9600 router, specifically version 2.0.6.206937. The vulnerability resides in the JNAP Action Handler component within the <code>/etc/init.d/run_central2.sh</code> script. Attackers can remotely exploit this flaw by manipulating the <code>pin</code> argument passed to the <code>BTRequestGetSmartConnectStatus</code> function. This allows for the execution of arbitrary operating system commands on the affected device. A public exploit is available, increasing the risk of exploitation. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the Linksys MR9600 router.</li>
<li>The request targets the JNAP Action Handler component, specifically the <code>/etc/init.d/run_central2.sh</code> script.</li>
<li>The <code>BTRequestGetSmartConnectStatus</code> function is invoked by the crafted request.</li>
<li>The attacker injects malicious OS commands within the <code>pin</code> argument of the <code>BTRequestGetSmartConnectStatus</code> function.</li>
<li>The router&rsquo;s firmware processes the request, failing to properly sanitize the <code>pin</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the running process, potentially <code>root</code>.</li>
<li>The attacker gains control of the router, potentially allowing for further malicious activities, such as network traffic interception or modification of router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6992 allows a remote attacker to execute arbitrary commands on the Linksys MR9600 router. This can lead to a complete compromise of the device, allowing the attacker to monitor network traffic, change router configurations, or use the router as a foothold for further attacks within the network. Given the availability of a public exploit, the risk of widespread exploitation is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2026-6992 Exploitation Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Apply the Sigma rule <code>Detect Suspicious Shell Activity via Web Request</code> to detect potential command injection attempts.</li>
<li>Monitor web server logs for requests containing suspicious characters in the <code>cs-uri-query</code> field that target <code>/etc/init.d/run_central2.sh</code> to uncover exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6992</category><category>command-injection</category><category>router</category><category>rce</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</link><pubDate>Sun, 26 Apr 2026 11:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Tenda F456 router, specifically version 1.0.0.5. The vulnerability resides within the <code>fromSafeClientFilter</code> function located in the <code>/goform/SafeClientFilter</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary code. Publicly available exploit code exists, increasing the risk of widespread exploitation targeting vulnerable Tenda F456 devices. This issue poses a significant threat to network security, as a compromised router can lead to data breaches, denial of service, or further network intrusion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda F456 router running firmware version 1.0.0.5 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>The crafted request includes a specially designed payload within the <code>menufacturer/Go</code> argument. This payload is designed to trigger a buffer overflow in the <code>fromSafeClientFilter</code> function.</li>
<li>The <code>fromSafeClientFilter</code> function processes the malicious input without proper bounds checking.</li>
<li>The oversized payload overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>When the <code>fromSafeClientFilter</code> function attempts to return, the overwritten return address is used, redirecting execution flow to attacker-controlled memory.</li>
<li>The attacker-controlled memory contains shellcode or other malicious instructions.</li>
<li>The router executes the attacker&rsquo;s code, granting the attacker control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can result in complete compromise of the Tenda F456 router. An attacker can gain unauthorized access to network traffic, modify router settings, or use the compromised device as a launchpad for further attacks within the network. Given the public availability of exploit code, a large number of Tenda F456 routers could be targeted, potentially affecting numerous home and small business networks. A successful attack could lead to data theft, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7033 on the F456 1.0.0.5 routers.</li>
<li>Implement network intrusion detection systems (IDS) or intrusion prevention systems (IPS) rules to detect and block malicious requests targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SafeClientFilter</code> with abnormally large <code>menufacturer/Go</code> argument values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7033</category><category>router</category></item><item><title>Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</link><pubDate>Sat, 25 Apr 2026 18:18:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</guid><description>A buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-6988, has been discovered in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides within the Boa Service, specifically affecting the <code>formRoute</code> function located in the <code>/boaform/formRouting</code> file. Successful exploitation of this flaw enables a remote attacker to overwrite memory by crafting a malicious request with a manipulated <code>nextHop</code> argument. This can lead to arbitrary code execution on the affected device. Given the potential for remote exploitation and the availability of a published exploit, this vulnerability poses a significant threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device with the vulnerable Boa web service exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boaform/formRouting</code> endpoint.</li>
<li>The crafted request includes a specially crafted <code>nextHop</code> argument, exceeding the buffer size allocated for it.</li>
<li>The Boa service processes the request without proper bounds checking on the <code>nextHop</code> argument.</li>
<li>The oversized <code>nextHop</code> argument overwrites adjacent memory regions, including critical program data or return addresses.</li>
<li>The overwritten return address redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code on the device with the privileges of the Boa service.</li>
<li>The attacker gains control of the device, potentially leading to data exfiltration, device hijacking, or further network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6988 can lead to complete compromise of the affected Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device. This may result in unauthorized access to the device&rsquo;s configuration, sensitive data exposure, or the device being used as a bot in a larger attack. Given that this device is likely used in home or small business environments, a successful attack could lead to significant data breaches, financial losses, and reputational damage. The availability of a public exploit increases the likelihood of widespread exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates released by Tenda to address CVE-2026-6988 as soon as possible.</li>
<li>Implement network segmentation to limit the exposure of Tenda devices to the internet or untrusted networks.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/boaform/formRouting</code> endpoint to detect potential exploit attempts (webserver log source).</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG10 Buffer Overflow Attempt&rdquo; to identify malicious HTTP requests exploiting the <code>nextHop</code> argument (Sigma rule).</li>
<li>Implement rate limiting on the <code>/boaform/formRouting</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve-2026-6988</category><category>tenda</category><category>iot</category></item><item><title>Rclone Unauthenticated Remote Code Execution Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-rclone-rce/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rclone-rce/</guid><description>Rclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.</description><content:encoded><![CDATA[<p>Two critical unauthenticated remote code execution vulnerabilities, CVE-2026-41176 and CVE-2026-41179, have been discovered in Rclone versions prior to 1.73.5. Rclone is a command-line program used to manage files on cloud storage services. These vulnerabilities can be exploited if the Rclone remote control (RC) API is enabled without proper authentication (e.g., <code>--rc-user/--rc-pass/--rc-htpasswd</code>). An attacker with network access to a vulnerable Rclone instance can bypass authentication, execute arbitrary commands, and potentially gain full system compromise. As organizations increasingly rely on cloud storage, vulnerabilities in tools like Rclone can have significant impact by enabling data theft and lateral movement. The vulnerabilities were reported on April 24, 2026, with no known active exploitation as of April 23, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target system running Rclone with the RC API enabled.</li>
<li>The attacker verifies the RC API is exposed on a reachable network address (e.g., not only localhost) and is not protected by HTTP authentication.</li>
<li>For CVE-2026-41179, the attacker sends a single crafted HTTP request to the RC endpoint, leveraging the WebDAV backend initialization process.</li>
<li>This crafted request triggers the execution of arbitrary commands on the target system without authentication.</li>
<li>For CVE-2026-41176, the attacker bypasses authentication controls to access sensitive administrative functionality.</li>
<li>The attacker manipulates Rclone configuration or invokes operational RC methods to execute arbitrary commands.</li>
<li>The attacker gains local file read/write access, potentially stealing sensitive data or uploading malicious payloads.</li>
<li>The attacker achieves full system compromise, enabling data theft, lateral movement within the network, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41176 and CVE-2026-41179 can lead to full system compromise, data theft, lateral movement, or denial of service. Specifically, attackers can achieve local file read, file write, or shell access, depending on the environment. The impact includes potential exposure of sensitive cloud data and configurations, which could compromise the integrity and confidentiality of stored information. Given Rclone&rsquo;s popularity among organizations managing cloud storage, a successful attack could affect a large number of victims across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rclone to version 1.73.5 or later to patch CVE-2026-41176 and CVE-2026-41179 as recommended by the vendor.</li>
<li>Enable global HTTP authentication on RC servers using <code>--rc-user</code>, <code>--rc-pass</code>, or <code>--rc-htpasswd</code> to mitigate the unauthenticated access, as mentioned in the description of the vulnerabilities.</li>
<li>Implement network-level controls (e.g., firewall rules) to restrict access to RC server endpoints and the RC service, as suggested by CCB.</li>
<li>Deploy the Sigma rule &ldquo;Detect Rclone RC API Access Without Authentication&rdquo; to identify potentially vulnerable Rclone instances within your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>vulnerability</category><category>rce</category><category>cloud</category></item><item><title>ERB Deserialization Bypass via def_module/def_method/def_class</title><link>https://feed.craftedsignal.io/briefs/2026-04-erb-deserialization/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-erb-deserialization/</guid><description>A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.</description><content:encoded><![CDATA[<p>Ruby versions before ERB 2.2.0 implemented an <code>@_init</code> instance variable guard in <code>ERB#result</code> and <code>ERB#run</code> to prevent code execution upon deserialization via <code>Marshal.load</code>. This guard is intended to block execution when an ERB object is reconstructed from untrusted data. However, the methods <code>ERB#def_method</code>, <code>ERB#def_module</code>, and <code>ERB#def_class</code> were not given the same protection, creating a bypass. An attacker capable of triggering <code>Marshal.load</code> on untrusted data in a Ruby application with the <code>erb</code> gem loaded can exploit <code>ERB#def_module</code> (using its zero-argument, default-parameter form) as a code execution sink. This bypass impacts Ruby on Rails applications that import untrusted serialized data, Ruby tools employing <code>Marshal.load</code> for caching or IPC, and legacy Rails applications (pre-7.0) utilizing Marshal for cookie session serialization. This bypass renders the <code>@_init</code> mitigation ineffective across all ERB versions from 2.2.0 through 6.0.3. Combined with the DeprecatedInstanceVariableProxy gadget (present in all ActiveSupport versions through 7.2.3), this enables a universal RCE gadget chain for Ruby 3.2+ applications using Rails. The vulnerability is identified as CVE-2026-41316.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Ruby object containing an <code>ERB</code> instance and/or an <code>ActiveSupport::Deprecation::DeprecatedInstanceVariableProxy</code> instance.</li>
<li>The <code>ERB</code> instance has its <code>@src</code> instance variable set to a string containing malicious code with the &ldquo;end\nsystem(&lsquo;id&rsquo;)\ndef x&rdquo; payload.</li>
<li>The vulnerable application calls <code>Marshal.load</code> on the crafted object, triggering deserialization.</li>
<li>During deserialization, the <code>DeprecatedInstanceVariableProxy</code> is instantiated (if used), which then invokes the <code>ERB#def_module</code> method via <code>method_missing</code>.</li>
<li>The <code>ERB#def_module</code> method calls <code>ERB#def_method</code> without checking the <code>@_init</code> guard.</li>
<li>Inside <code>ERB#def_method</code>, the malicious code in <code>@src</code> is wrapped in a method definition and evaluated via <code>module_eval</code>.</li>
<li>The &ldquo;end\nsystem(&lsquo;id&rsquo;)\ndef x&rdquo; payload causes the <code>system('id')</code> command to execute during the <code>module_eval</code> call, bypassing the intended deserialization protection.</li>
<li>The attacker achieves arbitrary code execution on the target system, gaining the ability to perform malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary code on the target system. This affects Ruby applications, including Ruby on Rails, which use <code>Marshal.load</code> on untrusted data. Specific impact includes potential compromise of web servers and the ability to read sensitive files, modify data, or install malware. Vulnerable applications include those using <code>Marshal.load</code> for caching, data import, or IPC, and legacy Rails applications (pre-7.0) using Marshal for cookie session serialization. This bypass renders the @_init mitigation ineffective across all ERB versions from 2.2.0 through 6.0.3.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade your erb gem to version 4.0.3.1, 4.0.4.1, 6.0.1.1, or 6.0.4 to patch the vulnerability as described in the &ldquo;Patches&rdquo; section.</li>
<li>Avoid using <code>Marshal.load</code> on untrusted data, as it is inherently unsafe. Consider using alternative serialization formats like JSON or YAML.</li>
<li>Deploy the &ldquo;Detect ERB def_module Code Execution via Deserialization&rdquo; Sigma rule to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>ruby</category><category>rails</category></item><item><title>Gemini CLI Remote Code Execution via Workspace Trust and Tool Allowlisting Bypasses</title><link>https://feed.craftedsignal.io/briefs/2026-04-gemini-cli-rce/</link><pubDate>Fri, 24 Apr 2026 19:30:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gemini-cli-rce/</guid><description>Gemini CLI is vulnerable to remote code execution via workspace trust and tool allowlisting bypasses, impacting headless mode and GitHub Actions workflows.</description><content:encoded><![CDATA[<p>Gemini CLI (<code>@google/gemini-cli</code>) versions prior to 0.39.1 and version 0.40.0-preview.2, along with the <code>run-gemini-cli</code> GitHub Action versions prior to 0.1.22, are susceptible to remote code execution due to insecure workspace trust handling and tool allowlisting bypasses. The vulnerability arises from the automatic trust of workspace folders in headless mode, allowing malicious environment variables within the <code>.gemini/</code> directory to be exploited. Furthermore, in <code>--yolo</code> mode, the tool allowlist was previously ignored, enabling prompt injection and code execution via commands like <code>run_shell_command</code>. This poses a risk, especially in CI/CD environments that process untrusted inputs such as pull requests. The patched version 0.39.1 enforces explicit folder trust in headless mode and properly evaluates tool allowlists under <code>--yolo</code>, mitigating these risks. This impacts all Gemini CLI GitHub Actions and requires users to review their workflows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker submits a malicious pull request to a repository using Gemini CLI in a GitHub Actions workflow.</li>
<li>The workflow, running in headless mode, automatically trusts the workspace folder (versions prior to 0.39.1).</li>
<li>The attacker&rsquo;s pull request includes a crafted <code>.gemini/</code> directory containing malicious environment variables.</li>
<li>Gemini CLI loads the malicious environment variables, leading to code execution.</li>
<li>Alternatively, the attacker injects a malicious prompt leveraging <code>run_shell_command</code> when <code>--yolo</code> is used.</li>
<li>The <code>run_shell_command</code> executes arbitrary commands on the runner due to the bypassed tool allowlist (versions prior to 0.39.1).</li>
<li>The attacker gains control of the CI/CD runner, potentially exfiltrating secrets or injecting malicious code into the deployment pipeline.</li>
<li>Successful exploitation leads to code execution on the CI/CD runner, data exfiltration, or supply chain compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability impacts workflows utilizing Gemini CLI in headless mode, particularly those processing untrusted inputs such as pull requests from external contributors. Successful exploitation can lead to remote code execution on the CI/CD runner, potentially enabling attackers to exfiltrate sensitive information, such as API keys and credentials, or inject malicious code into the application deployment pipeline. This can lead to a supply chain compromise. All Gemini CLI GitHub Actions are affected, requiring users to review and update their workflows.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>@google/gemini-cli</code> to version 0.39.1 or later, or 0.40.0-preview.3 if using a preview version.</li>
<li>Upgrade <code>actions/google-github-actions/run-gemini-cli</code> to version 0.1.22 or later.</li>
<li>For workflows running on trusted inputs, set <code>GEMINI_TRUST_WORKSPACE: 'true'</code> in the GitHub Actions workflow.</li>
<li>For workflows processing untrusted inputs, review the hardening guidance in <a href="https://github.com/google-github-actions/run-gemini-cli">google-github-actions/run-gemini-cli</a> and set the environment variable accordingly.</li>
<li>Review and harden tool allowlists in <code>~/.gemini/settings.json</code> to restrict the commands that can be executed, especially when using the <code>--yolo</code> flag.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>supply-chain</category><category>github-actions</category></item><item><title>BridgeHead FileStore Unauthenticated Remote Code Execution via Apache Axis2</title><link>https://feed.craftedsignal.io/briefs/2026-04-bridgehead-filestore-rce/</link><pubDate>Fri, 24 Apr 2026 16:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-bridgehead-filestore-rce/</guid><description>BridgeHead FileStore versions prior to 24A are vulnerable to unauthenticated remote code execution via exposed Apache Axis2 administration module with default credentials, enabling attackers to upload malicious web services and execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>BridgeHead FileStore versions prior to 24A, released in early 2024, expose a critical security vulnerability. Specifically, the Apache Axis2 administration module is accessible on network endpoints with default credentials. This flaw allows unauthenticated remote attackers to execute arbitrary operating system commands. The vulnerability stems from insecure default configurations within the FileStore application and the underlying Axis2 web service framework. Successful exploitation grants complete control over the affected system, potentially leading to data breaches, system compromise, and further lateral movement within the network. This vulnerability poses a significant risk to organizations using vulnerable versions of BridgeHead FileStore.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a BridgeHead FileStore instance running a vulnerable version of the software on a network-accessible endpoint.</li>
<li>The attacker accesses the Apache Axis2 administration console, which is exposed due to a misconfiguration.</li>
<li>The attacker authenticates to the Axis2 admin console using default credentials, bypassing authentication controls.</li>
<li>The attacker uploads a malicious Java archive (WAR file) containing a web service designed to execute arbitrary commands.</li>
<li>The attacker deploys the malicious web service through the Axis2 administration interface.</li>
<li>The attacker crafts a SOAP request to the deployed malicious web service, embedding the operating system command to be executed.</li>
<li>The vulnerable FileStore instance processes the SOAP request, executing the attacker-controlled command on the host operating system.</li>
<li>The attacker gains remote code execution, achieving complete control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39920 allows unauthenticated attackers to execute arbitrary OS commands on systems running vulnerable versions of BridgeHead FileStore. This can lead to complete system compromise, data breaches, denial of service, and further lateral movement within the network. While the exact number of affected organizations is unknown, the widespread use of BridgeHead FileStore in data protection and archiving scenarios makes this a critical vulnerability. The consequences of a successful attack could include the loss of sensitive data, disruption of business operations, and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the update to FileStore version 24A or later to remediate the vulnerability as mentioned in the product updates page (<a href="https://www.bridgeheadsoftware.com/rapid-data-protection-product-updates/">https://www.bridgeheadsoftware.com/rapid-data-protection-product-updates/</a>).</li>
<li>Monitor web server logs for suspicious POST requests to the Axis2 administration console (<code>/axis2/servlet/AdminServlet</code>) as it is a key component of the exploitation. Use the &ldquo;Detect Axis2 Admin Access&rdquo; Sigma rule to identify unauthorized access attempts.</li>
<li>Implement network segmentation to limit the exposure of BridgeHead FileStore instances and the Axis2 administration module.</li>
<li>Review and enforce strong authentication policies for all web-based administration interfaces.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>cve-2026-39920</category><category>apache axis2</category><category>default credentials</category><category>web service</category></item><item><title>Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization</title><link>https://feed.craftedsignal.io/briefs/2026-04-ray-parquet-rce/</link><pubDate>Fri, 24 Apr 2026 16:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ray-parquet-rce/</guid><description>Ray Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.</description><content:encoded><![CDATA[<p>Ray Data, a component of the Ray distributed computing framework, is susceptible to remote code execution (RCE) due to unsafe deserialization of Parquet file metadata. The vulnerability stems from Ray&rsquo;s registration of custom Arrow extension types (<code>ray.data.arrow_tensor</code>, <code>ray.data.arrow_tensor_v2</code>, <code>ray.data.arrow_variable_shaped_tensor</code>) within PyArrow. When a Parquet file containing these extension types is processed, the <code>__arrow_ext_deserialize__</code> function is invoked, leading to the execution of arbitrary code through <code>cloudpickle.loads()</code> on the field&rsquo;s metadata, prior to any data being read.  This issue affects Ray versions 2.49.0 through 2.54.0, introduced in July 2025 via commit <code>f6d21db1a4</code>. Successful exploitation does not require authentication or network access to a Ray cluster. Instead, it hinges on the framework reading a maliciously crafted Parquet file, which can originate from various sources like cloud storage, HuggingFace datasets, or shared file systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a Parquet file containing a column with a <code>ray.data.arrow_tensor</code>, <code>ray.data.arrow_tensor_v2</code>, or <code>ray.data.arrow_variable_shaped_tensor</code> extension type.</li>
<li>The attacker injects a malicious payload in the <code>ARROW:extension:metadata</code> field of the Parquet file, serialized using <code>cloudpickle</code>.</li>
<li>The attacker places the crafted Parquet file in a location accessible to a Ray Data pipeline, such as a HuggingFace dataset, a shared filesystem, or a cloud storage bucket.</li>
<li>A Ray Data pipeline, using functions like <code>ray.data.read_parquet()</code>, <code>pyarrow.parquet.read_table()</code>, or <code>pandas.read_parquet()</code>, attempts to read the Parquet file.</li>
<li>During schema parsing, PyArrow encounters the custom Arrow extension type and automatically calls the <code>__arrow_ext_deserialize__</code> method.</li>
<li>The <code>__arrow_ext_deserialize__</code> method invokes <code>_deserialize_with_fallback()</code>, which attempts to deserialize the metadata using <code>cloudpickle.loads()</code>.</li>
<li>The <code>cloudpickle.loads()</code> function executes the attacker&rsquo;s arbitrary code from the crafted Parquet metadata.</li>
<li>The attacker achieves arbitrary command execution as the user running the Ray worker process, potentially leading to full server compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability affects Ray versions 2.49.0 through 2.54.0, impacting any process utilizing Ray Data that reads Parquet files. The global registration of extension types in PyArrow means that all Parquet reads within the affected process are vulnerable. An attacker can achieve arbitrary command execution as the Ray worker process user, leading to full server compromise, without requiring authentication or cluster access. Successful exploitation allows attackers to compromise systems by simply placing a malicious Parquet file in a location that a Ray Data pipeline processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Ray to a patched version beyond 2.54.0 to remediate the vulnerability, ensuring the fix addresses the <code>cloudpickle.loads()</code> call in the deserialization path.</li>
<li>Implement strict input validation and sanitization for Parquet files before processing them with Ray Data to prevent the execution of malicious payloads embedded in the <code>ARROW:extension:metadata</code> field.</li>
<li>Monitor for suspicious process execution originating from <code>python</code> processes using <code>cloudpickle.loads()</code> with the intent of arbitrary code execution.</li>
<li>Deploy the Sigma rule <code>Detect Ray Data Parquet Deserialization RCE</code> to detect exploitation attempts by monitoring for specific metadata within Parquet files.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>remote-code-execution</category><category>parquet</category><category>deserialization</category><category>cloudpickle</category><category>ray</category></item><item><title>Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud</title><link>https://feed.craftedsignal.io/briefs/2026-04-stripe-webhook-bypass/</link><pubDate>Fri, 24 Apr 2026 15:43:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-stripe-webhook-bypass/</guid><description>A vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the Stripe webhook handler that allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without making any payment. Disclosed on 2025-04-15 and patched the same day in v0.12.10, the vulnerability stems from three compounding flaws: the Stripe webhook endpoint does not reject requests when <code>StripeWebhookSecret</code> is empty (the default), any attacker can compute valid webhook signatures when the HMAC secret is empty, and the <code>Recharge</code> function does not validate that the order&rsquo;s <code>PaymentMethod</code> matches the callback source. This enables cross-gateway exploitation where orders created via any payment method can be fulfilled through a forged Stripe webhook. This vulnerability allows for financial fraud through unlimited API quota acquisition without payment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker registers a user account on the target platform.</li>
<li>Attacker calls <code>POST /api/user/pay</code> to create an Epay top-up order, setting the <code>amount</code>. The order is stored with a <code>pending</code> status.</li>
<li>Attacker queries <code>GET /api/user/topup/self</code> to retrieve the <code>trade_no</code> of the pending order.</li>
<li>Attacker computes an <code>HMAC-SHA256</code> signature with an empty key over a crafted <code>checkout.session.completed</code> payload. This payload contains the stolen <code>trade_no</code> as the <code>client_reference_id</code>.</li>
<li>Attacker sends a <code>POST</code> request to <code>/api/stripe/webhook</code> with the forged payload and a crafted <code>Stripe-Signature</code> header.</li>
<li>The server verifies the signature, which passes because the <code>StripeWebhookSecret</code> is empty.</li>
<li>The server calls the <code>Recharge()</code> function, which finds the Epay order by <code>trade_no</code>, marks the order as <code>success</code>, and credits the attacker&rsquo;s account with the full quota.</li>
<li>The attacker repeats steps 2-6 indefinitely to accumulate unlimited credits, leading to financial fraud.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows attackers to obtain unlimited API quota without payment, leading to financial fraud. The operator of the vulnerable system faces financial losses due to fraudulent quota consumption against upstream AI providers such as OpenAI, Anthropic, and Google. The fraudulent top-ups can appear as normal transactions in system logs, making detection challenging. Due to the default insecure configuration, virtually all deployments with any payment method enabled are vulnerable, creating a wide exposure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Set <code>StripeWebhookSecret</code> to a non-empty value to prevent empty-key HMAC forgery, mitigating the primary attack vector (Flaw 1).</li>
<li>Apply a reverse proxy (Nginx, Caddy, etc.) to deny access to <code>/api/stripe/webhook</code> if Stripe is not configured, as a temporary workaround.</li>
<li>Deploy the Sigma rule <code>Detect Forged Stripe Webhook Request</code> to identify potential exploitation attempts by monitoring requests to the webhook endpoint with empty secrets or invalid signatures.</li>
<li>Upgrade to v0.12.10 immediately, as it addresses all three flaws completely.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>stripe</category><category>webhook</category><category>signature-bypass</category><category>quota-fraud</category></item><item><title>OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-rce/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-rce/</guid><description>OpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.31 suffers from a remote code execution vulnerability (CVE-2026-41352). This flaw exists because a device-paired node can bypass the node scope gate authentication mechanism. An attacker who has already obtained device pairing credentials can exploit this vulnerability to execute arbitrary node commands on the host system. This occurs because the application doesn&rsquo;t perform adequate node pairing validation, allowing malicious actors to potentially gain complete control over the affected system if successfully exploited. Defenders should prioritize patching to version 2026.3.31 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the OpenClaw system. This may involve social engineering or other means of obtaining device pairing credentials.</li>
<li>The attacker leverages the device pairing credentials to authenticate to a device-paired node.</li>
<li>The attacker attempts to execute a node command on the host system.</li>
<li>Due to the missing authorization check (CWE-862), the node scope gate authentication mechanism is bypassed.</li>
<li>The system incorrectly validates the request, failing to properly verify node pairing.</li>
<li>The attacker successfully executes an arbitrary node command on the host system.</li>
<li>The attacker escalates privileges, potentially gaining full control over the system.</li>
<li>The attacker can then perform malicious activities such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41352 allows an attacker with valid device pairing credentials to execute arbitrary commands on the host system. This can lead to a complete compromise of the OpenClaw system and potentially the entire network. The number of potential victims is dependent on the number of deployments of OpenClaw before version 2026.3.31. The impact includes data breaches, system downtime, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41352.</li>
<li>Monitor OpenClaw systems for unauthorized command execution attempts. While no specific IOCs are available, monitor for unexpected process executions originating from the OpenClaw application.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>cve-2026-41352</category></item><item><title>Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)</title><link>https://feed.craftedsignal.io/briefs/2026-04-marimo-rce/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-marimo-rce/</guid><description>CVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.</description><content:encoded><![CDATA[<p>A pre-authentication remote code execution vulnerability, CVE-2026-39987, exists within the Marimo application. This vulnerability allows an unauthenticated attacker to gain shell access and execute arbitrary system commands on the affected system. Given the nature of the vulnerability, all versions of Marimo are potentially affected unless patched or mitigated. Successful exploitation could lead to complete system compromise, data theft, or denial of service. The vulnerability was publicly disclosed in April 2026 and organizations using Marimo should take immediate action to address it.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a specially crafted request to the Marimo server.</li>
<li>The Marimo application fails to properly validate or sanitize the input within the request.</li>
<li>This input is processed by the server without proper authorization checks.</li>
<li>Due to the lack of input validation, the attacker injects malicious code into the application.</li>
<li>The injected code is executed with the privileges of the Marimo process.</li>
<li>The attacker gains shell access to the underlying operating system.</li>
<li>The attacker executes arbitrary system commands, potentially installing malware or exfiltrating data.</li>
<li>The attacker establishes persistence for continued access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39987 allows an unauthenticated attacker to execute arbitrary system commands on a server running Marimo. This could lead to complete compromise of the system, including data theft, malware installation, or denial of service. The number of potential victims is dependent on the number of Marimo deployments, but given the pre-authentication nature of the vulnerability, any unpatched instance is at risk. Sectors particularly at risk are those relying on Marimo for critical services or data management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by the vendor to address CVE-2026-39987 or discontinue use of the product.</li>
<li>Deploy the Sigma rule &ldquo;Detect Marimo Exploitation Attempt&rdquo; to identify potential exploitation attempts targeting CVE-2026-39987 within web server logs.</li>
<li>Monitor network traffic for suspicious outbound connections originating from Marimo servers, which could indicate successful exploitation.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services if Marimo is deployed in a cloud environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-39987</category><category>rce</category><category>vulnerability</category></item><item><title>Apache ActiveMQ Vulnerabilities Allow RCE and XSS</title><link>https://feed.craftedsignal.io/briefs/2026-04-activemq-rce-xss/</link><pubDate>Fri, 24 Apr 2026 09:09:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-activemq-rce-xss/</guid><description>An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to execute arbitrary program code or perform cross-site scripting attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in Apache ActiveMQ allow a remote, authenticated attacker to execute arbitrary code or perform cross-site scripting (XSS) attacks. While specific CVEs and attack vectors are not detailed in this advisory, the presence of both RCE and XSS vulnerabilities suggests a high risk to organizations using affected versions of ActiveMQ. Exploitation requires authentication, implying that attackers may need to compromise credentials or exploit other vulnerabilities to gain initial access. This combination of vulnerabilities could lead to complete system compromise, data theft, or service disruption. The lack of specific version information makes it crucial for organizations to identify and patch all potentially vulnerable ActiveMQ instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains valid credentials to access the ActiveMQ management console or API, potentially through credential stuffing, phishing, or exploiting other vulnerabilities.</li>
<li>Authentication: The attacker authenticates to the ActiveMQ instance using the compromised credentials.</li>
<li>Vulnerability Exploitation (RCE): The attacker exploits a deserialization or other RCE vulnerability to inject malicious code into the ActiveMQ server. This may involve crafting a specific message or request to trigger the vulnerability.</li>
<li>Code Execution: The injected code executes within the context of the ActiveMQ server process, granting the attacker control over the system.</li>
<li>Privilege Escalation (if necessary): The attacker attempts to escalate privileges to gain root or system-level access, depending on the initial privileges of the ActiveMQ process.</li>
<li>Lateral Movement: The attacker uses the compromised ActiveMQ server as a pivot point to move laterally within the network, targeting other systems and resources.</li>
<li>Vulnerability Exploitation (XSS): Simultaneously or independently, the attacker exploits an XSS vulnerability within the ActiveMQ web console. This may involve injecting malicious JavaScript code into the console.</li>
<li>Impact: The attacker deploys ransomware, exfiltrates sensitive data, or disrupts critical services, depending on their objectives. The XSS vulnerability allows the attacker to steal administrator cookies or inject further malicious content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the ActiveMQ server, potentially affecting all connected systems and applications. The lack of specifics makes it difficult to determine the exact number of potential victims; however, given the widespread use of ActiveMQ in enterprise environments, the impact could be significant. Consequences include data breaches, service disruption, financial loss, and reputational damage. The combination of RCE and XSS vulnerabilities allows attackers to pursue a wide range of malicious objectives, from data theft to system destruction.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all Apache ActiveMQ instances within your environment and determine their versions.</li>
<li>Consult the Apache ActiveMQ security advisories to identify specific vulnerabilities affecting your versions and apply the necessary patches.</li>
<li>Implement strong authentication and authorization controls to restrict access to the ActiveMQ management console and API.</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts against ActiveMQ instances.</li>
<li>Review and harden the ActiveMQ configuration to minimize the attack surface and reduce the risk of exploitation.</li>
<li>Implement network segmentation to limit the impact of a successful compromise of an ActiveMQ instance.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>activemq</category><category>rce</category><category>xss</category><category>apache</category></item><item><title>PhantomRPC: Windows RPC Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-phantom-rpc-privesc/</link><pubDate>Fri, 24 Apr 2026 08:00:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phantom-rpc-privesc/</guid><description>A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.</description><content:encoded><![CDATA[<p>Kaspersky researchers discovered a critical vulnerability in the Windows Remote Procedure Call (RPC) architecture, dubbed PhantomRPC, that enables local privilege escalation. The flaw allows an attacker to create a rogue RPC server and, by exploiting existing processes with impersonation privileges (such as those running as Local Service or Network Service), elevate their own permissions to SYSTEM. The vulnerability resides in the architectural design of RPC itself, making it potentially exploitable across all Windows versions. The researcher has demonstrated five different exploitation paths escalating privileges from various local or network service contexts. This issue has been disclosed to Microsoft, but a patch has not yet been released. Due to the fundamental nature of the vulnerability, the number of potential attack vectors is effectively unlimited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system with low privileges.</li>
<li>The attacker identifies a service running with <code>SeImpersonatePrivilege</code>, such as Local Service or Network Service.</li>
<li>The attacker crafts a malicious RPC server application designed to exploit the PhantomRPC vulnerability.</li>
<li>The attacker triggers a connection from the target service (e.g., Group Policy Client service) to the attacker&rsquo;s malicious RPC server via ALPC.</li>
<li>The malicious RPC server uses <code>RpcImpersonateClient</code> API to impersonate the SYSTEM account.</li>
<li>The attacker&rsquo;s malicious RPC server executes code within the security context of the SYSTEM account.</li>
<li>The attacker leverages the elevated privileges to perform arbitrary actions, such as installing malware, creating new accounts, or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PhantomRPC allows a low-privileged attacker to gain complete control over the affected system by escalating privileges to SYSTEM. This can lead to complete system compromise, including data theft, malware installation, and denial of service. The vulnerability affects all Windows versions and given the number of potential attack vectors, it poses a significant risk to a large number of systems. While the exact number of potential victims remains unknown, the widespread use of RPC in Windows makes this a highly critical issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of suspicious ALPC ports, especially those targeting services with <code>SeImpersonatePrivilege</code>. Use the Sigma rule <code>Detect Suspicious ALPC Port Creation</code> to identify potential exploitation attempts.</li>
<li>Monitor for processes calling the <code>RpcImpersonateClient</code> API, especially those originating from unusual or untrusted processes. Use the Sigma rule <code>Detect RpcImpersonateClient API Call from Unusual Process</code> to identify potential exploitation attempts.</li>
<li>Restrict access to services with <code>SeImpersonatePrivilege</code> where possible, limiting the potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>rpc</category><category>windows</category></item><item><title>Flowise Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-flowise-multiple-vulnerabilities/</link><pubDate>Fri, 24 Apr 2026 06:24:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-flowise-multiple-vulnerabilities/</guid><description>Multiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.</description><content:encoded><![CDATA[<p>Flowise is susceptible to multiple vulnerabilities that could allow a malicious actor to perform several harmful actions. These vulnerabilities, if successfully exploited, could lead to arbitrary code execution, allowing the attacker to gain control of the system. Furthermore, the attacker could bypass security measures put in place to protect the application and its data. Information disclosure could also occur, potentially exposing sensitive data. Finally, the attacker could manipulate files, leading to data corruption or other malicious activities. The lack of specific vulnerability details makes precise mitigation challenging, but the wide range of potential impacts necessitates immediate attention and proactive defense measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Flowise instance.</li>
<li>The attacker exploits a vulnerability that allows arbitrary code execution. This could involve sending a specially crafted request to the server.</li>
<li>The attacker executes malicious code on the server, potentially escalating privileges.</li>
<li>The attacker uses the gained access to bypass security measures, such as authentication or authorization controls.</li>
<li>The attacker accesses sensitive information stored within the Flowise application or its database, leading to data leakage.</li>
<li>The attacker modifies or deletes critical files, disrupting the application&rsquo;s functionality or causing data loss.</li>
<li>The attacker maintains persistence through backdoors or other methods to ensure continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in a complete compromise of the Flowise application and the underlying system. This could lead to significant data breaches, financial losses, and reputational damage. Affected organizations could face regulatory penalties and legal liabilities. The wide range of potential impacts, including arbitrary code execution, security bypass, information disclosure, and file manipulation, makes this a critical threat requiring immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious activity and unusual HTTP requests targeting Flowise to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious Flowise HTTP Requests</code> to identify potentially malicious requests.</li>
<li>Implement a Web Application Firewall (WAF) with rules to block common attack patterns and payloads that could exploit the vulnerabilities in Flowise.</li>
<li>Enable verbose logging on the Flowise application to capture detailed information about user activity and system events. This can aid in identifying and investigating suspicious behavior. Deploy the Sigma rule <code>Detect Flowise Log Tampering</code> to detect potential log manipulation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>code-execution</category><category>information-disclosure</category><category>file-manipulation</category></item><item><title>Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</link><pubDate>Fri, 24 Apr 2026 05:43:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cisco-multiple-vulns/</guid><description>Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.</description><content:encoded><![CDATA[<p>A cluster of vulnerabilities affects Cisco ASA (Adaptive Security Appliance), Cisco Secure Firewall Threat Defense, Cisco IOS, Cisco IOS XE, and Cisco IOS XR. A remote attacker, either authenticated or anonymous, can exploit these vulnerabilities to bypass authentication mechanisms and execute arbitrary code with administrator privileges. The broad scope of affected products, ranging from security appliances to core networking infrastructure, makes this a critical issue for organizations relying on Cisco technology. Successful exploitation could lead to widespread network compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Cisco device (ASA, Firewall Threat Defense, IOS, IOS XE, or IOS XR).</li>
<li>Attacker exploits a vulnerability allowing authentication bypass.</li>
<li>Upon successful authentication bypass, the attacker gains unauthorized access to the device.</li>
<li>Attacker leverages another vulnerability on the compromised system to inject and execute arbitrary code.</li>
<li>The code executes with administrator privileges, granting the attacker full control over the device.</li>
<li>Attacker uses the compromised device as a pivot point to move laterally within the network.</li>
<li>Attacker compromises additional systems and exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to complete compromise of affected Cisco devices, allowing attackers to gain full administrative control. This can result in significant data breaches, service disruptions, and the potential for lateral movement within the network to compromise other critical systems. The broad range of affected Cisco products means a wide array of organizations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Consult Cisco&rsquo;s security advisories for specific vulnerability details and apply the appropriate patches or mitigations as soon as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco</category><category>vulnerability</category><category>rce</category><category>authentication-bypass</category></item><item><title>UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices</title><link>https://feed.craftedsignal.io/briefs/2026-04-uat-4356-firestarter/</link><pubDate>Thu, 23 Apr 2026 15:11:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-uat-4356-firestarter/</guid><description>UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.</description><content:encoded><![CDATA[<p>Cisco Talos reported that UAT-4356 continues to actively target Cisco Firepower devices running the Firepower eXtensible Operating System (FXOS). In early 2024, Cisco Talos attributed the ArcaneDoor campaign to UAT-4356, a state-sponsored actor focused on gaining access to network perimeter devices for espionage. The actor exploits n-day vulnerabilities CVE-2025-20333 and CVE-2025-20362 to gain unauthorized access to vulnerable devices. Upon successful exploitation, UAT-4356 deploys a custom-built backdoor called &ldquo;FIRESTARTER,&rdquo; which shares technical capabilities with RayInitiator&rsquo;s Stage 3 shellcode. FIRESTARTER enables remote access and the execution of arbitrary code within the LINA process, a core component of Cisco&rsquo;s ASA and FTD appliances. This allows the attackers to maintain persistent access to compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>UAT-4356 exploits CVE-2025-20333 and/or CVE-2025-20362 on Cisco Firepower devices running FXOS to gain initial access.</li>
<li>The attacker manipulates the CSP_MOUNT_LIST to establish persistence for the FIRESTARTER backdoor.</li>
<li>The FIRESTARTER backdoor is written to <code>/opt/cisco/platform/logs/var/log/svc_samcore.log</code> and the CSP_MOUNT_LIST is updated to copy itself to <code>/usr/bin/lina_cs</code>.</li>
<li>After a graceful reboot, FIRESTARTER is executed from <code>/usr/bin/lina_cs</code>.</li>
<li>FIRESTARTER restores the original CSP_MOUNT_LIST from <code>/tmp/CSP_MOUNTLIST.tmp</code> and removes the temporary copy and the trojanized <code>/usr/bin/lina_cs</code> file from disk.</li>
<li>FIRESTARTER reads the LINA process’ memory, searching for specific byte sequences to verify memory layout.</li>
<li>FIRESTARTER copies the next stage shellcode to the last 0x200 bytes of the &ldquo;libstdc++.so&rdquo; memory region.</li>
<li>The attacker overwrites an internal data structure in the LINA process to replace a pointer to a legitimate WebVPN XML handler function with the address of the malicious shellcode. This allows execution of arbitrary shellcode received via WebVPN requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Cisco Firepower devices allow UAT-4356 to gain a foothold on network perimeters for espionage. Successful exploitation and deployment of the FIRESTARTER backdoor enable attackers to execute arbitrary shellcode, potentially leading to data exfiltration, further network compromise, or disruption of services. The number of victims is currently unknown, but this campaign targets network perimeter devices, which could impact organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the file integrity monitoring rule to detect the creation or modification of <code>/usr/bin/lina_cs</code> and <code>/opt/cisco/platform/logs/var/log/svc_samcore.log</code> (see &ldquo;File Creation in Suspicious Directory&rdquo;).</li>
<li>Apply software upgrade recommendations outlined in Cisco&rsquo;s Security Advisory to mitigate CVE-2025-20333 and CVE-2025-20362.</li>
<li>Monitor network traffic for WebVPN requests containing unexpected XML payloads that might be used to trigger the FIRESTARTER backdoor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>uat-4356</category><category>firestarter</category><category>cisco</category><category>backdoor</category><category>network</category><category>espionage</category></item><item><title>OpenC3 COSMOS SQL Injection Vulnerability in QuestDB Time-Series Database</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-openc3-sql-injection/</link><pubDate>Thu, 23 Apr 2026 14:12:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-openc3-sql-injection/</guid><description>A SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS, allowing an authenticated remote user to execute arbitrary SQL commands, including telemetry data disclosure and deletion.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in the OpenC3 COSMOS Time-Series Database (TSDB) component, which utilizes QuestDB. The vulnerability resides within the <code>tsdb_lookup</code> function in the <code>cvt_model.rb</code> file, where user-supplied input is directly incorporated into SQL queries without proper sanitization. An authenticated attacker with &ldquo;tlm&rdquo; permissions, which includes Admin, Operator, Viewer, or Runner roles, can exploit this flaw to inject arbitrary SQL commands. This can lead to unauthorized data access, modification, or deletion within the TSDB. The affected versions are OpenC3 rubygems package versions &gt;= 6.7.0 and &lt; 7.0.0-rc3. Successful exploitation allows attackers to compromise the confidentiality, integrity, and availability of telemetry data stored within the COSMOS system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the COSMOS system with a role that possesses &ldquo;tlm&rdquo; permissions (Admin, Operator, Viewer, or Runner).</li>
<li>The attacker crafts a malicious JSON-RPC request targeting the <code>get_tlm_values</code> endpoint.</li>
<li>Within the request body, the attacker injects a SQL payload into the <code>start_time</code> parameter, such as <code>' OR 1=1 --</code>.</li>
<li>The <code>tsdb_lookup</code> function incorporates the unsanitized input into a SQL query.</li>
<li>The injected SQL payload manipulates the query logic, allowing the attacker to bypass intended restrictions.</li>
<li>The attacker can then exfiltrate all telemetry data within the database by manipulating the SQL query.</li>
<li>The attacker modifies the SQL payload to execute arbitrary commands, such as <code>DROP TABLE</code> statements.</li>
<li>The attacker successfully deletes historical data from the database, impacting data availability and system integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows an attacker to perform unauthorized actions on the OpenC3 COSMOS Time-Series Database (TSDB). An attacker with &ldquo;tlm&rdquo; permissions can disclose sensitive telemetry data, modify existing data, or delete data altogether. The vulnerability impacts systems running OpenC3 rubygems package versions &gt;= 6.7.0 and &lt; 7.0.0-rc3. Depending on the role of the compromised account and the specific SQL commands executed, an attacker could potentially cause significant disruption to operations relying on the integrity and availability of telemetry data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>rubygems/openc3</code> package to version 7.0.0-rc3 or later to remediate the SQL injection vulnerability.</li>
<li>Implement input sanitization on user-supplied data within the <code>tsdb_lookup</code> function in <code>cvt_model.rb</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious OpenC3 Telemetry Requests&rdquo; to identify potential exploitation attempts targeting the <code>get_tlm_values</code> endpoint.</li>
<li>Review and restrict &ldquo;tlm&rdquo; permissions to the <code>get_tlm_values</code> RPC endpoint according to the principle of least privilege, limiting access to only those users who require it.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>openc3</category><category>cosmos</category><category>questdb</category><category>telemetry</category></item></channel></rss>