<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Buffer-Overflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/buffer-overflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 17:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/buffer-overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Qualcomm PLC FW Buffer Overflow via Incorrect Authorization (CVE-2026-25293)</title><link>https://feed.craftedsignal.io/briefs/2026-05-plc-buffer-overflow/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-plc-buffer-overflow/</guid><description>CVE-2026-25293 is a critical buffer overflow vulnerability in Qualcomm PLC FW due to incorrect authorization, potentially allowing unauthorized access and control over programmable logic controllers.</description><content:encoded><![CDATA[<p>CVE-2026-25293 describes a buffer overflow vulnerability affecting Qualcomm&rsquo;s Programmable Logic Controller Firmware (PLC FW).  The root cause is an incorrect authorization mechanism within the firmware. This flaw could allow an attacker to potentially overwrite memory buffers, leading to arbitrary code execution or denial of service. The vulnerability was disclosed in Qualcomm&rsquo;s May 2026 security bulletin. Successful exploitation of this vulnerability could allow unauthorized modification of PLC configurations, potentially impacting industrial control systems and automation processes. The affected PLC FW is used in a range of industrial applications, increasing the scope and severity of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PLC FW device on the network.</li>
<li>The attacker leverages CVE-2026-25293 to bypass authorization checks.</li>
<li>A crafted network packet is sent to the PLC FW, exploiting the buffer overflow.</li>
<li>The overflowed buffer overwrites critical memory regions.</li>
<li>Attacker gains control of PLC FW execution flow.</li>
<li>Malicious code is injected into the PLC memory space.</li>
<li>The injected code executes, potentially modifying PLC logic or disrupting operations.</li>
<li>The attacker achieves unauthorized control over the PLC, leading to disruption, data manipulation, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-25293 could allow attackers to gain complete control over Programmable Logic Controllers (PLCs). This could lead to significant disruptions in industrial control systems, manufacturing processes, and other automated systems. The vulnerability affects Qualcomm PLC FW, potentially impacting a large number of devices across various sectors. The high CVSS score of 9.6 reflects the critical impact of this vulnerability, including the potential for complete system compromise and denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches provided by Qualcomm as detailed in their May 2026 security bulletin (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html">https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html</a>) to remediate CVE-2026-25293.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Network Traffic to PLC Devices&rdquo; to identify potential exploitation attempts.</li>
<li>Implement strict network segmentation to limit the attack surface and prevent lateral movement to PLC devices.</li>
<li>Monitor network traffic for unexpected patterns or unauthorized access attempts to PLC devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>plc</category><category>buffer-overflow</category><category>industrial-control-systems</category><category>cve-2026-25293</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability in setWanConfig</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-n300rh-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setWanConfig</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. An attacker can exploit this vulnerability by manipulating the <code>priDns</code> argument in a crafted POST request. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the device. Public exploits for this vulnerability are already available, increasing the risk of exploitation. This vulnerability was published on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>priDns</code> argument with a value exceeding the buffer size.</li>
<li>The <code>setWanConfig</code> function processes the <code>priDns</code> argument without proper bounds checking.</li>
<li>The oversized <code>priDns</code> value overwrites adjacent memory on the stack, potentially including control flow data.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining a shell.</li>
<li>The attacker could then use the compromised router to perform lateral movement, exfiltrate data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the Totolink N300RH router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a pivot point to attack other devices on the network. Given that public exploits are available, a wide range of attackers could potentially exploit this vulnerability. The CVSS v3.1 base score is 8.8 (HIGH).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with abnormally long <code>priDns</code> values to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect and block malicious POST requests targeting <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Contact Totolink for a security patch or firmware update to address CVE-2026-7749.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve-2026-7749</category></item><item><title>Totolink N300RH Buffer Overflow Vulnerability (CVE-2026-7750)</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</link><pubDate>Mon, 04 May 2026 10:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink N300RH 3.2.4-B20220812 allowing remote attackers to execute arbitrary code by manipulating the mac_address argument in the setMacFilterRules function of the /cgi-bin/cstecgi.cgi POST request handler.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7750, affects Totolink N300RH router version 3.2.4-B20220812. The vulnerability resides in the <code>setMacFilterRules</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles POST requests. Attackers can exploit this flaw by sending a specially crafted POST request with an overly long <code>mac_address</code> parameter, triggering a buffer overflow. Successful exploitation allows for arbitrary code execution on the device. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread attacks. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink N300RH router running firmware version 3.2.4-B20220812.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>mac_address</code> parameter, injecting a string longer than the buffer allocated for it.</li>
<li>The <code>setMacFilterRules</code> function processes the POST request without proper bounds checking on the <code>mac_address</code> argument.</li>
<li>The overly long <code>mac_address</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The injected code executes with the privileges of the web server, allowing the attacker to execute arbitrary commands.</li>
<li>The attacker gains complete control over the router, potentially using it for further malicious activities such as network pivoting, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7750 allows a remote attacker to execute arbitrary code on the vulnerable Totolink N300RH device. This could lead to a complete compromise of the router, allowing the attacker to control network traffic, steal sensitive information, or use the router as a bot in a larger attack. Given the public availability of the exploit, a large number of unpatched devices could be vulnerable to automated attacks, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7750.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block suspicious POST requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with excessively long <code>mac_address</code> parameters.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for unusual POST requests to <code>/cgi-bin/cstecgi.cgi</code>, focusing on requests with large <code>mac_address</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>cve</category><category>webserver</category></item><item><title>GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</link><pubDate>Mon, 04 May 2026 06:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gobgp-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in the osrg GoBGP software, specifically affecting versions up to 4.3.0. The vulnerability resides in the <code>PathAttributeAigp.DecodeFromBytes</code> function of the <code>pkg/packet/bgp/bgp.go</code> file, which is part of the AIGP Attribute Parser component. An attacker can remotely trigger this vulnerability by sending a crafted BGP message containing a malicious AIGP attribute. Successful exploitation could lead to arbitrary code execution on the affected system. GoBGP is an open source BGP implementation. Organizations using GoBGP for routing purposes should upgrade to version 4.4.0 or apply the provided patch (51ad1ada06cb41ce47b7066799981816f50b7ced) to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoBGP instance running a vulnerable version (&lt;= 4.3.0).</li>
<li>Attacker crafts a malicious BGP update message containing a specially crafted AIGP attribute.</li>
<li>The crafted AIGP attribute is designed to trigger a buffer overflow in the <code>PathAttributeAigp.DecodeFromBytes</code> function.</li>
<li>The attacker sends the malicious BGP update message to the vulnerable GoBGP instance over TCP port 179.</li>
<li>The GoBGP instance receives the message and attempts to parse the AIGP attribute using the vulnerable function.</li>
<li>The <code>PathAttributeAigp.DecodeFromBytes</code> function fails to properly validate the size of the input data, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker leverages the memory corruption to execute arbitrary code on the GoBGP instance, gaining control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected GoBGP instance. This can lead to a complete compromise of the routing infrastructure, allowing the attacker to intercept, modify, or disrupt network traffic. In service provider environments, this could affect a large number of customers and cause significant network outages. Given the CVSS v3.1 score of 7.3, this is considered a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to GoBGP version 4.4.0 to remediate the vulnerability as mentioned in the overview.</li>
<li>Apply the patch <code>51ad1ada06cb41ce47b7066799981816f50b7ced</code> to the affected component to mitigate the vulnerability if upgrading is not immediately possible.</li>
<li>Monitor network traffic for BGP update messages with unusually large or malformed AIGP attributes, using a network intrusion detection system.</li>
<li>Deploy the Sigma rule detecting connections to port 179 from unusual sources to identify potentially malicious hosts attempting to exploit the vulnerability.</li>
<li>Review and harden BGP configuration to limit accepted peer connections to trusted sources only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7735</category><category>buffer-overflow</category><category>bgp</category></item><item><title>Totolink WA300 Buffer Overflow Vulnerability (CVE-2026-7719)</title><link>https://feed.craftedsignal.io/briefs/2024-01-totolink-wa300-buffer-overflow/</link><pubDate>Mon, 04 May 2026 02:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totolink-wa300-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Totolink WA300 version 5.2cu.7112_B20190227 within the loginauth function of the /cgi-bin/cstecgi.cgi file, specifically affecting the POST Request Handler component, triggerable via manipulation of the http_host argument, and remotely exploitable with a publicly available exploit.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7719, has been discovered in Totolink WA300 version 5.2cu.7112_B20190227. This vulnerability resides within the <code>loginauth</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file, affecting the POST Request Handler component. The vulnerability is triggered by manipulating the <code>http_host</code> argument in a POST request. The exploit is publicly available, increasing the risk of widespread exploitation. This vulnerability allows for remote code execution, potentially granting attackers full control over the affected device. The affected version was released in February 2019. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink WA300 device running firmware version 5.2cu.7112_B20190227.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted POST request includes a specially crafted <code>http_host</code> argument designed to overflow the buffer in the <code>loginauth</code> function.</li>
<li>The vulnerable <code>loginauth</code> function processes the <code>http_host</code> argument without proper bounds checking.</li>
<li>The oversized <code>http_host</code> argument overwrites adjacent memory regions, including the return address on the stack.</li>
<li>Upon completion of the <code>loginauth</code> function, the overwritten return address is used, redirecting execution to attacker-controlled code.</li>
<li>The attacker-controlled code executes with elevated privileges, allowing the attacker to execute arbitrary commands on the device.</li>
<li>The attacker gains complete control of the device, potentially using it for malicious purposes such as botnet participation, data theft, or further network penetration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7719 allows a remote attacker to execute arbitrary code on the vulnerable Totolink WA300 device. This can lead to complete device compromise, allowing the attacker to steal sensitive information, use the device as a botnet node, or pivot to other devices on the network. Given the public availability of the exploit, widespread exploitation is possible, potentially affecting a large number of home and small business networks using the vulnerable device.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink WA300 HTTP Host Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually long <code>http_host</code> headers.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting CVE-2026-7719.</li>
<li>Upgrade to a patched version of the firmware or replace the affected device to remediate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>remote code execution</category><category>cve-2026-7719</category><category>totolink</category></item><item><title>Totolink WA300 Buffer Overflow Vulnerability in UploadCustomModule</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-wa300-buffer-overflow/</link><pubDate>Mon, 04 May 2026 01:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-wa300-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the UploadCustomModule function of the /cgi-bin/cstecgi.cgi file in the POST Request Handler component of Totolink WA300 version 5.2cu.7112_B20190227, which can be exploited by manipulating the File argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Totolink WA300 wireless router, specifically version 5.2cu.7112_B20190227. The vulnerability resides within the <code>UploadCustomModule</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file, a component of the POST Request Handler. The identified vulnerability allows a remote attacker to cause a buffer overflow through manipulation of the <code>File</code> argument within a crafted POST request. Public proof-of-concept exploit code is available, increasing the likelihood of exploitation. This vulnerability poses a significant risk, as successful exploitation could lead to arbitrary code execution, potentially allowing attackers to fully compromise affected devices. Defenders should prioritize detection and mitigation strategies to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Totolink WA300 device running firmware version 5.2cu.7112_B20190227.</li>
<li>Attacker crafts a malicious POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The POST request includes a <code>File</code> argument with a payload exceeding the buffer size allocated for the <code>UploadCustomModule</code> function.</li>
<li>The <code>UploadCustomModule</code> function processes the POST request without proper bounds checking on the <code>File</code> argument.</li>
<li>The oversized <code>File</code> argument overwrites adjacent memory regions, including potentially critical program data and control flow instructions.</li>
<li>The buffer overflow allows the attacker to inject and execute arbitrary code on the device.</li>
<li>The attacker gains remote shell access to the device with elevated privileges.</li>
<li>The attacker could then use the compromised device to pivot into the internal network or cause a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability can lead to complete compromise of the affected Totolink WA300 device. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the device as a bot in a larger attack. Given the high CVSS score of 8.8, the impact is considered critical. Home and small business networks using the affected router model are at risk. The vulnerability allows for remote code execution, leading to significant potential for damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink WA300 UploadCustomModule Buffer Overflow Attempt</code> to detect malicious POST requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually large <code>File</code> parameters, as indicated in the Sigma rule.</li>
<li>Apply any available firmware updates from Totolink to patch CVE-2026-7717 if they become available.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other internal network resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>remote-code-execution</category><category>router</category></item><item><title>Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, tracked as CVE-2026-7684, affects Edimax BR-6428nC devices up to version 1.16. The vulnerability resides in the <code>/goform/setWAN</code> file, specifically within the handling of the <code>pptpDfGateway</code> argument. An unauthenticated attacker can exploit this flaw remotely by sending a crafted request to the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond, suggesting that a patch is unlikely and highlighting the need for mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Edimax BR-6428nC device running a vulnerable firmware version (&lt;= 1.16).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>The request includes the <code>pptpDfGateway</code> parameter with a value exceeding the expected buffer size.</li>
<li>The device processes the request, and the oversized <code>pptpDfGateway</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow.</li>
<li>Execution is redirected to attacker-controlled code injected within the overflowed buffer.</li>
<li>The attacker gains arbitrary code execution on the device, potentially achieving full system control.</li>
<li>The attacker could then use this control to modify device settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow an attacker to gain complete control of the Edimax BR-6428nC device. This could enable the attacker to intercept and modify network traffic, access sensitive information, or use the device as a point of entry for further attacks within the network. Given the public availability of exploit code, the risk of widespread exploitation is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Edimax_BR_6428nC_Buffer_Overflow_setWAN</code> to detect suspicious HTTP requests targeting the vulnerable endpoint and parameter.</li>
<li>Consider blocking or rate-limiting access to the <code>/goform/setWAN</code> endpoint from untrusted networks.</li>
<li>Since the vendor is unresponsive and a patch is unlikely, network segmentation and access control policies are the best mitigation options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7684</category><category>webserver</category></item><item><title>Edimax BR-6208AC Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</guid><description>A buffer overflow vulnerability exists in Edimax BR-6208AC devices (&lt;= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-7685, has been identified in Edimax BR-6208AC routers up to version 1.02. The vulnerability resides within the <code>/goform/setWAN</code> file, specifically related to the <code>pptpDfGateway</code> argument. Successful exploitation of this flaw could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but has not responded. Given the ease of exploitation and the potential for significant impact, this vulnerability poses a critical threat to affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Edimax BR-6208AC router with firmware version 1.02 or earlier exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>pptpDfGateway</code> argument, injecting a payload exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s web server processes the malicious request without proper input validation on the size of the <code>pptpDfGateway</code> argument.</li>
<li>The oversized payload overwrites adjacent memory regions on the stack, potentially including return addresses or other critical data.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker, leading to arbitrary code execution.</li>
<li>The attacker executes commands to gain control of the device, potentially installing malware or modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Edimax BR-6208AC router. An attacker could leverage this access to perform a variety of malicious activities, including eavesdropping on network traffic, injecting malicious code into web pages served by the router, or using the router as a bot in a larger botnet. Given the availability of public exploits, unpatched devices are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Edimax BR-6208AC setWAN Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to <code>/goform/setWAN</code> containing unusually long <code>pptpDfGateway</code> parameters, as detected by the Sigma rule <code>Detect Long pptpDfGateway Parameter</code>.</li>
<li>Apply appropriate network segmentation to limit the blast radius of compromised devices and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7685</category><category>router</category><category>webserver</category></item><item><title>Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-buffer-overflow/</link><pubDate>Sun, 03 May 2026 03:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in Shenzhen Libituo Technology LBT-T300-HW1 version 1.2.8 and earlier, allowing remote attackers to execute arbitrary code by manipulating the Channel/ApCliSsid argument in the start_lan function of the /apply.cgi file.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7675, affects Shenzhen Libituo Technology LBT-T300-HW1 devices with firmware versions up to 1.2.8. The vulnerability resides in the <code>start_lan</code> function within the <code>/apply.cgi</code> file. By manipulating the <code>Channel/ApCliSsid</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists for this vulnerability. The vendor was notified about the vulnerability, but there has been no response. This vulnerability is considered critical due to the potential for remote exploitation and the availability of exploit code.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Shenzhen Libituo Technology LBT-T300-HW1 device running firmware version 1.2.8 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/apply.cgi</code> endpoint.</li>
<li>The HTTP request includes a specially crafted <code>Channel/ApCliSsid</code> argument designed to overflow the buffer in the <code>start_lan</code> function.</li>
<li>The vulnerable <code>start_lan</code> function receives the malicious input and attempts to process it without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including potentially the return address on the stack.</li>
<li>The attacker gains control of the program execution flow by overwriting the return address with the address of malicious code.</li>
<li>The injected code executes with the privileges of the web server process.</li>
<li>The attacker achieves arbitrary code execution, potentially gaining full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected device. Given that this is a router, this could lead to complete compromise of the device, including the ability to intercept and manipulate network traffic, install malware, or use the device as part of a botnet. Due to the public availability of the exploit, widespread exploitation is possible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply network intrusion detection system (NIDS) rules to detect and block malicious HTTP requests targeting <code>/apply.cgi</code> with excessively long <code>Channel/ApCliSsid</code> values.</li>
<li>Deploy the Sigma rule <code>Detect-LBT-T300-HW1-applycgi-buffer-overflow</code> to your SIEM and tune for your environment to identify exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/apply.cgi</code> and analyze the length of the <code>Channel/ApCliSsid</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer overflow</category><category>remote code execution</category><category>web application vulnerability</category></item><item><title>Shenzhen Libituo Technology LBT-T300-HW1 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-bo/</link><pubDate>Sun, 03 May 2026 02:17:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-lbt-t300-hw1-bo/</guid><description>A buffer overflow vulnerability (CVE-2026-7674) exists in the Web Management Interface of Shenzhen Libituo Technology LBT-T300-HW1 devices, allowing remote attackers to execute arbitrary code by manipulating the vpn_pptp_server or vpn_l2tp_server arguments in the start_single_service function.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7674, affects Shenzhen Libituo Technology LBT-T300-HW1 devices up to version 1.2.8. The vulnerability resides within the Web Management Interface, specifically in the <code>start_single_service</code> function. By sending a crafted request to the device and manipulating the <code>vpn_pptp_server</code> or <code>vpn_l2tp_server</code> arguments, an attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability can be exploited remotely, making it a significant threat to affected devices. The vendor was notified but did not respond, increasing the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable LBT-T300-HW1 device with version 1.2.8 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the Web Management Interface.</li>
<li>The malicious request includes a payload designed to overflow the buffer when processing the <code>vpn_pptp_server</code> or <code>vpn_l2tp_server</code> arguments.</li>
<li>The crafted request is sent to the <code>start_single_service</code> function.</li>
<li>The <code>start_single_service</code> function attempts to process the overly long input without proper bounds checking.</li>
<li>The buffer overflow overwrites adjacent memory regions, including potentially executable code or critical data structures.</li>
<li>The attacker gains control of the device by redirecting execution flow to attacker-controlled code injected into the buffer.</li>
<li>The attacker executes arbitrary code on the device, potentially gaining persistent access or causing denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected LBT-T300-HW1 device. This could lead to complete system compromise, including data theft, modification of device settings, or use of the device as a bot in a larger attack. Given the lack of vendor response, many devices could be vulnerable if exposed to the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious VPN Server Configuration via Web Interface</code> to detect potential exploitation attempts targeting the vulnerable <code>start_single_service</code> function in web server logs.</li>
<li>Monitor network traffic for unusually long strings passed as values for <code>vpn_pptp_server</code> and <code>vpn_l2tp_server</code> parameters in HTTP requests to the device&rsquo;s web interface.</li>
<li>Apply any available patches or firmware updates released by Shenzhen Libituo Technology to address CVE-2026-7674.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>web-management-interface</category><category>cve-2026-7674</category></item><item><title>TRENDnet TEW-821DAP Firmware Update Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-trendnet-buffer-overflow/</link><pubDate>Sat, 02 May 2026 08:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-trendnet-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in TRENDnet TEW-821DAP version 1.12B01, allowing a remote attacker to execute arbitrary code by manipulating the 'str' argument in the auto_update_firmware function of the Firmware Update component.</description><content:encoded><![CDATA[<p>CVE-2026-7607 describes a buffer overflow vulnerability affecting TRENDnet TEW-821DAP version 1.12B01. The vulnerability resides within the auto_update_firmware function of the Firmware Update component. A remote attacker can exploit this flaw by sending a crafted request with a maliciously oversized &lsquo;str&rsquo; argument, leading to a buffer overflow. Although the CVSS score is high, the vendor has stated that the affected product reached its end-of-life 8 years ago and is no longer supported, significantly reducing the risk of widespread exploitation. This lack of support means no patches or updates will be provided, leaving vulnerable devices exposed if still in operation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable TRENDnet TEW-821DAP device running firmware version 1.12B01.</li>
<li>Attacker sends a specially crafted network packet to the device, targeting the Firmware Update component.</li>
<li>The packet includes a malicious &lsquo;str&rsquo; argument exceeding the buffer&rsquo;s allocated size in the auto_update_firmware function.</li>
<li>The device attempts to process the firmware update, copying the oversized &lsquo;str&rsquo; argument into the undersized buffer.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>Attacker hijacks control of the execution flow by overwriting the return address with the address of malicious code.</li>
<li>The device executes the attacker&rsquo;s arbitrary code with the privileges of the Firmware Update component.</li>
<li>The attacker gains control of the device, potentially enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability could allow an attacker to gain complete control over the affected TRENDnet TEW-821DAP device. This could lead to unauthorized network access, data theft, or the device being used as a bot in a larger attack. Given that the affected product is EOL, the number of actively exploitable devices is likely low, but any remaining devices are at significant risk since no patch will be available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify and isolate any TRENDnet TEW-821DAP devices running firmware version 1.12B01 on your network. Consider decommissioning them if possible due to the end-of-life status and lack of security updates.</li>
<li>Monitor network traffic for suspicious packets targeting the Firmware Update component of TRENDnet devices. Implement intrusion detection rules to identify and block potentially malicious requests (see example Sigma rule below).</li>
<li>Since this is a buffer overflow on a network device, monitor for unusual process creation or network connections originating from TRENDnet devices.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit the vulnerability by monitoring for unusual data lengths in network traffic related to firmware updates.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>buffer-overflow</category><category>firmware-update</category><category>network-device</category></item><item><title>Totolink NR1800X Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-rce/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-7546) in the Totolink NR1800X router allows remote attackers to achieve arbitrary code execution by sending a crafted HTTP request with a manipulated Host header to the vulnerable lighttpd component.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-7546, affects Totolink NR1800X routers running firmware version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>find_host_ip</code> function of the lighttpd web server component. By exploiting this flaw, a remote, unauthenticated attacker can trigger a stack-based buffer overflow through manipulation of the Host argument in an HTTP request. The publicly disclosed exploit allows attackers to potentially gain complete control of the device. This vulnerability poses a significant risk to home and small business networks utilizing the affected Totolink router model, as successful exploitation leads to arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X router running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker crafts a malicious HTTP request targeting the router&rsquo;s web interface.</li>
<li>The crafted request includes a <code>Host</code> header with a string exceeding the buffer size allocated in the <code>find_host_ip</code> function within the <code>lighttpd</code> component.</li>
<li>The router&rsquo;s <code>lighttpd</code> server processes the HTTP request and passes the <code>Host</code> header value to the vulnerable function.</li>
<li>The <code>find_host_ip</code> function attempts to store the oversized <code>Host</code> value in a stack-allocated buffer.</li>
<li>A stack-based buffer overflow occurs due to the insufficient buffer size.</li>
<li>The overflow overwrites adjacent memory on the stack, potentially including the return address.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7546 allows a remote attacker to execute arbitrary code on the vulnerable Totolink NR1800X device. This can lead to complete control of the router, allowing the attacker to modify router settings, intercept network traffic, or use the compromised router as a pivot point for further attacks within the network. Given the nature of stack-based buffer overflows, the attacker can potentially install persistent backdoors or malware. This presents a significant risk to users, potentially exposing sensitive data and infrastructure to unauthorized access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches released by Totolink to remediate CVE-2026-7546.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting Totolink routers, specifically looking for abnormally long Host headers with the Sigma rule &ldquo;Detect Suspiciously Long Host Header&rdquo;.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Review and harden router configurations, including disabling remote administration if not required.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>remote code execution</category><category>buffer overflow</category><category>router</category></item><item><title>UTT HiPER 1200GW Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</link><pubDate>Fri, 01 May 2026 00:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in UTT HiPER 1200GW devices up to version 2.5.3-170306, stemming from manipulation of the `strcpy` function in the `/goform/formRemoteControl` file, which allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in UTT HiPER 1200GW devices with firmware versions up to 2.5.3-170306. The flaw resides within the <code>strcpy</code> function of the <code>/goform/formRemoteControl</code> file, which handles remote control functionalities. A remote attacker can exploit this vulnerability by sending a specially crafted request to trigger the buffer overflow, potentially leading to arbitrary code execution on the affected device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations using the affected UTT HiPER 1200GW devices, as it could allow attackers to gain unauthorized access and control over the device and potentially the network it is connected to.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable UTT HiPER 1200GW device exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/goform/formRemoteControl</code> endpoint.</li>
<li>The malicious request includes a payload designed to overflow the buffer when processed by the <code>strcpy</code> function.</li>
<li>The vulnerable <code>strcpy</code> function within <code>/goform/formRemoteControl</code> copies the attacker-controlled data without proper bounds checking.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker leverages the overflow to inject and execute arbitrary code on the device.</li>
<li>The attacker gains control of the device, potentially escalating privileges.</li>
<li>The attacker uses the compromised device to pivot to other systems on the network, exfiltrate sensitive data, or cause further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to complete compromise of the affected UTT HiPER 1200GW device. Attackers could gain unauthorized access to sensitive data, disrupt device functionality, or use the device as a foothold for further attacks within the network. Given that public exploits are available, the risk of widespread exploitation is high. While the exact number of affected devices is unknown, organizations using UTT HiPER 1200GW devices should take immediate action to mitigate this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from UTT to address the buffer overflow vulnerability in UTT HiPER 1200GW devices.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/goform/formRemoteControl</code> endpoint, and deploy the Sigma rule <code>Detect Suspicious Requests to FormRemoteControl</code> to identify potentially malicious activity.</li>
<li>Implement input validation and sanitization measures to prevent buffer overflows in web applications.</li>
<li>Consider network segmentation to limit the impact of a compromised device on other systems within the network.</li>
<li>Review and restrict access to the device&rsquo;s web interface to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve</category></item><item><title>code-projects Plugin 4.1.2cu.5137 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-code-projects-buffer-overflow/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-code-projects-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-7503) exists in code-projects Plugin 4.1.2cu.5137, allowing a remote attacker to execute arbitrary code by manipulating the 'wepkey2' argument in the 'setWiFiMultipleConfig' function of the '/lib/cste_modules/wireless.so' library, posing a critical risk due to publicly available exploits.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7503, has been discovered in code-projects Plugin version 4.1.2cu.5137. The vulnerability resides within the <code>setWiFiMultipleConfig</code> function in the <code>/lib/cste_modules/wireless.so</code> library, which is part of the <code>/cgi-bin/cstecgi.cgi</code> executable. Successful exploitation is achieved through manipulation of the <code>wepkey2</code> argument, allowing for remote code execution. The vulnerability is considered highly critical due to the availability of a public exploit, increasing the likelihood of widespread exploitation and potential compromise of affected systems. This poses a significant threat to devices utilizing the vulnerable plugin version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system running code-projects Plugin 4.1.2cu.5137.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The request includes a specially crafted payload for the <code>wepkey2</code> argument within the <code>setWiFiMultipleConfig</code> function.</li>
<li>The vulnerable function <code>setWiFiMultipleConfig</code> processes the malicious input without proper bounds checking.</li>
<li>The oversized <code>wepkey2</code> argument overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker injects malicious code into the memory space via the buffer overflow.</li>
<li>The injected code executes, granting the attacker control over the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7503 can lead to complete system compromise, allowing attackers to execute arbitrary code, steal sensitive information, or cause denial-of-service conditions. Due to the ready availability of an exploit, any system running the vulnerable code-projects plugin version 4.1.2cu.5137 is at immediate risk. The lack of specific victim numbers or sector targeting information in the provided source does not diminish the critical nature of the vulnerability given the high CVSS score (8.8) and public exploit.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Code-Projects WiFi Configuration Buffer Overflow Attempt&rdquo; to your SIEM to detect exploitation attempts targeting the vulnerable <code>setWiFiMultipleConfig</code> function and monitor web server logs (cs-uri-query).</li>
<li>Apply input validation and sanitization to prevent buffer overflows. This issue occurs within the <code>/lib/cste_modules/wireless.so</code> library called by <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint, as this is the entry point for exploiting CVE-2026-7503.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7503</category></item><item><title>Tenda 4G300 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</link><pubDate>Thu, 30 Apr 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-stack-overflow/</guid><description>A remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda 4G300 routers, specifically version US_4G300V1.0Mt_V1.01.42_CN_TDC01. The vulnerability resides within the <code>sub_427C3C</code> function located in the <code>/goform/SafeMacFilter</code> file. An attacker can exploit this flaw by manipulating the <code>page</code> argument in a crafted request, leading to a buffer overflow and potentially allowing for arbitrary code execution on the affected device. The vulnerability, identified as CVE-2026-7470, poses a significant risk as remote exploitation is possible, and a proof-of-concept exploit is publicly available, increasing the likelihood of malicious actors leveraging this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda 4G300 router running the vulnerable firmware version US_4G300V1.0Mt_V1.01.42_CN_TDC01.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeMacFilter</code> endpoint.</li>
<li>The crafted request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>sub_427C3C</code> function.</li>
<li>The router processes the HTTP request, passing the oversized <code>page</code> argument to the vulnerable function.</li>
<li>The <code>sub_427C3C</code> function attempts to write the oversized data into a stack-based buffer, causing a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory on the stack, including the return address.</li>
<li>The attacker redirects execution flow to a malicious code payload injected into the request or elsewhere in memory.</li>
<li>The injected code executes with the privileges of the router process, potentially allowing the attacker to gain full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda 4G300 router. An attacker could gain unauthorized access to the device&rsquo;s configuration, intercept network traffic, or use the router as a launching point for further attacks against other devices on the network or the internet. Given the widespread use of these routers in homes and small businesses, a successful attack could impact a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/goform/SafeMacFilter</code> with abnormally long <code>page</code> parameters. Use the provided Sigma rule to detect suspicious activity.</li>
<li>Implement rate limiting on the <code>/goform/SafeMacFilter</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7470.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-7470</category></item><item><title>UTT HiPER 1250GW Buffer Overflow Vulnerability (CVE-2026-7420)</title><link>https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability in UTT HiPER 1250GW devices (versions up to 3.2.7-210907-180535) allows remote attackers to execute arbitrary code by manipulating the 'Profile' argument in the `strcpy` function of the `route/goform/ConfigAdvideo` file, due to insufficient bounds checking.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-7420, has been identified in UTT HiPER 1250GW devices. The vulnerability exists in versions up to 3.2.7-210907-180535. The vulnerability lies within the <code>strcpy</code> function in the <code>route/goform/ConfigAdvideo</code> file, where the &lsquo;Profile&rsquo; argument is not properly validated, leading to a buffer overflow condition. This allows unauthenticated remote attackers to potentially execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of exploitation. Defenders should implement mitigations and detection strategies immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable UTT HiPER 1250GW device exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>route/goform/ConfigAdvideo</code> endpoint.</li>
<li>The HTTP request includes a &lsquo;Profile&rsquo; argument with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>strcpy</code> function attempts to copy the oversized &lsquo;Profile&rsquo; argument into the undersized buffer.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions.</li>
<li>The attacker injects malicious code into the overflowed memory region to gain code execution.</li>
<li>The attacker achieves remote code execution on the UTT HiPER 1250GW device.</li>
<li>The attacker gains control of the device, potentially using it for further malicious activities such as lateral movement, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the UTT HiPER 1250GW device. This can lead to complete compromise of the device, potentially enabling attackers to gain unauthorized access to the network it is connected to, exfiltrate sensitive data, or use the device as a bot in a botnet. The impact is significant, especially if these devices are used in critical infrastructure or sensitive environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates for UTT HiPER 1250GW devices to remediate CVE-2026-7420.</li>
<li>Implement network segmentation to isolate UTT HiPER 1250GW devices from critical network segments.</li>
<li>Deploy the Sigma rule <code>Detect UTT HiPER Buffer Overflow Attempt</code> to identify malicious HTTP requests targeting the <code>route/goform/ConfigAdvideo</code> endpoint.</li>
<li>Monitor web server logs for unusual activity and large &lsquo;Profile&rsquo; argument values in requests to <code>route/goform/ConfigAdvideo</code> to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>iot</category></item><item><title>UTT HiPER 1250GW Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-overflow/</link><pubDate>Wed, 29 Apr 2026 22:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-overflow/</guid><description>A remote buffer overflow vulnerability exists in the UTT HiPER 1250GW device due to improper handling of the 'Profile' argument in the NTP configuration, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7418, has been discovered in UTT HiPER 1250GW devices with firmware versions up to 3.2.7-210907-180535. The vulnerability resides within the <code>strcpy</code> function in the <code>route/goform/NTP</code> file. A remote attacker can exploit this vulnerability by manipulating the <code>Profile</code> argument during NTP configuration. Successful exploitation could lead to arbitrary code execution on the affected device. The vulnerability has been publicly disclosed, increasing the risk of exploitation. This poses a significant threat to organizations using the affected UTT HiPER 1250GW devices, as attackers could potentially gain control of the device and use it as a foothold for further malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable UTT HiPER 1250GW device with a firmware version up to 3.2.7-210907-180535.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/route/goform/NTP</code> endpoint.</li>
<li>The crafted request includes a specially designed <code>Profile</code> argument containing a payload that exceeds the buffer size allocated for it.</li>
<li>The web server on the UTT HiPER 1250GW device receives the HTTP request and passes the <code>Profile</code> argument to the <code>strcpy</code> function.</li>
<li>The <code>strcpy</code> function copies the oversized <code>Profile</code> argument into the undersized buffer, leading to a buffer overflow.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or executable code.</li>
<li>The attacker gains arbitrary code execution on the device with the privileges of the web server process.</li>
<li>The attacker can then use this foothold to further compromise the device or the network it is connected to, potentially leading to data exfiltration or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7418 can allow a remote attacker to execute arbitrary code on the affected UTT HiPER 1250GW device. This could allow the attacker to gain full control of the device, potentially leading to data exfiltration, denial-of-service attacks, or further compromise of the network to which the device is connected. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Given the public availability of the exploit, organizations using the affected devices are at increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by UTT to address CVE-2026-7418 on HiPER 1250GW devices.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NTP Profile Argument</code> to detect exploitation attempts against the <code>/route/goform/NTP</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/route/goform/NTP</code> endpoint with unusually long <code>Profile</code> arguments to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7418</category></item><item><title>Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)</title><link>https://feed.craftedsignal.io/briefs/2026-04-alloksoft-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-alloksoft-overflow/</guid><description>Alloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.</description><content:encoded><![CDATA[<p>Alloksoft Video Joiner version 4.6.1217 is susceptible to a buffer overflow vulnerability (CVE-2018-25315). This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack involves crafting a malicious string and supplying it to the &ldquo;License Name&rdquo; field of the application during registration. Exploitation occurs due to the application&rsquo;s failure to properly validate the length of the input, allowing a buffer overflow to occur. The attacker leverages Structured Exception Handler (SEH) overwrite and injects shellcode to gain code execution in the context of the application. This vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Alloksoft Video Joiner 4.6.1217 installed.</li>
<li>The attacker identifies the &ldquo;License Name&rdquo; field within the application&rsquo;s registration process as a potential vulnerability point.</li>
<li>The attacker crafts a malicious string that exceeds the expected buffer size for the &ldquo;License Name&rdquo; field.</li>
<li>The malicious string includes an SEH overwrite payload, redirecting execution flow to the attacker&rsquo;s controlled memory.</li>
<li>The crafted string also contains shellcode designed to perform arbitrary code execution.</li>
<li>The attacker inputs the malicious string into the &ldquo;License Name&rdquo; field and submits the registration form.</li>
<li>The application attempts to process the oversized string, triggering a buffer overflow.</li>
<li>The SEH overwrite redirects execution to the injected shellcode, granting the attacker arbitrary code execution within the context of the Alloksoft Video Joiner process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the Alloksoft Video Joiner application. This could lead to complete system compromise, data theft, or installation of malware. While the specific number of affected users is unknown, any system running the vulnerable version of the software is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>VideoJoiner.exe</code> spawning unusual child processes, indicative of code execution stemming from the overflow.</li>
<li>Consider deploying network egress rules to block connections originating from <code>VideoJoiner.exe</code> to external IPs to prevent command and control.</li>
<li>Implement application control policies to prevent the execution of unsigned or untrusted code within the context of <code>VideoJoiner.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25315</category><category>windows</category></item><item><title>Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)</title><link>https://feed.craftedsignal.io/briefs/2026-04-alloksoft-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-alloksoft-buffer-overflow/</guid><description>Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.</description><content:encoded><![CDATA[<p>Allok Soft WMV to AVI MPEG DVD WMV Converter version 4.6.1217 is susceptible to a buffer overflow vulnerability (CVE-2018-25314). This vulnerability allows a local attacker to execute arbitrary code on a targeted system. The attack vector involves supplying an overly long string to the &ldquo;License Name&rdquo; field of the application, triggering the buffer overflow. Successful exploitation allows attackers to inject and execute shellcode within the context of the application, potentially leading to privilege escalation and complete system compromise. This vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious input string containing shellcode.</li>
<li>The malicious string is designed to overwrite the Structured Exception Handler (SEH).</li>
<li>Attacker opens Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217.</li>
<li>Attacker inputs the crafted string into the &ldquo;License Name&rdquo; field within the application&rsquo;s interface.</li>
<li>The application attempts to process the oversized input, triggering a buffer overflow.</li>
<li>The overflow overwrites the SEH with a pointer to the attacker-controlled shellcode.</li>
<li>An exception is triggered within the application.</li>
<li>The SEH handler is invoked, redirecting execution flow to the injected shellcode, enabling arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25314 allows a local attacker to execute arbitrary code with the privileges of the Allok Soft WMV to AVI MPEG DVD WMV Converter application. This could lead to sensitive data theft, installation of malware, or complete system compromise. While specific victim counts are unavailable, any system running the vulnerable software is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>wmvconverter.exe</code> spawning unusual child processes using the <code>Alloksoft WMV Converter Spawning Suspicious Process</code> Sigma rule.</li>
<li>Monitor for unexpected registry modifications performed by <code>wmvconverter.exe</code> using the <code>Alloksoft WMV Converter Registry Modification</code> Sigma rule.</li>
<li>Consider removing Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 from systems where it is not essential, as no patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25314</category></item><item><title>Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prime95-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prime95-overflow/</guid><description>Prime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.</description><content:encoded><![CDATA[<p>Prime95 is a popular application used for finding Mersenne prime numbers, often employed for stress-testing computer hardware. Version 29.4b8 of Prime95 is vulnerable to a local buffer overflow (CVE-2018-25299). An attacker with local access can exploit this vulnerability to execute arbitrary code on the system. The vulnerability stems from insufficient input validation when handling the optional proxy hostname field within the PrimeNet connection settings. By providing an overly long string, an attacker can overwrite parts of the process memory, specifically the Structured Exception Handling (SEH) chain. This allows them to redirect the flow of execution to attacker-controlled code, leading to arbitrary command execution. This vulnerability was published on April 29, 2026, and poses a significant risk to systems running the vulnerable software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system running Prime95 29.4b8.</li>
<li>The attacker modifies the PrimeNet connection settings within Prime95.</li>
<li>The attacker supplies a malicious payload within the optional &ldquo;proxy hostname&rdquo; field, exceeding the expected buffer size.</li>
<li>When Prime95 attempts to process the overly long proxy hostname, a buffer overflow occurs.</li>
<li>The overflow overwrites the Structured Exception Handling (SEH) record on the stack.</li>
<li>When an exception occurs within Prime95 (triggered intentionally or unintentionally), the overwritten SEH record points to attacker-controlled code.</li>
<li>The system attempts to handle the exception, causing execution to jump to the attacker-controlled code injected via the proxy hostname.</li>
<li>The attacker&rsquo;s code executes with the privileges of the Prime95 process, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected system. This can lead to complete system compromise, data theft, or installation of malware. Since the vulnerability is local, an attacker needs prior access to the system, either through social engineering, stolen credentials, or other means. However, once access is obtained, exploitation is relatively straightforward. This vulnerability has a high CVSS score of 8.4, reflecting the significant potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Prime95 that addresses CVE-2018-25299. Check the vendor&rsquo;s website (<a href="https://www.mersenne.org/download/#download">https://www.mersenne.org/download/#download</a>) for updates.</li>
<li>Implement strong input validation on any configuration files or settings that Prime95 reads to prevent buffer overflows.</li>
<li>Monitor process creation events for unusual activity originating from the Prime95 executable, which could indicate exploitation. Deploy the Sigma rule provided to detect suspicious command line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25299</category></item><item><title>Free Download Manager 2.0 Built 417 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-fdm-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fdm-buffer-overflow/</guid><description>Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>Free Download Manager (FDM) version 2.0 Built 417 is susceptible to a local buffer overflow vulnerability (CVE-2018-25304) within its URL import functionality. This vulnerability, discovered and reported by VulnCheck, allows an attacker to craft a malicious URL file. When a user imports this specially crafted file through the &ldquo;File &gt; Import &gt; Import lists of downloads&rdquo; menu, the application attempts to process the &lsquo;Location&rsquo; header response, triggering a buffer overflow. This overflow overwrites the Structured Exception Handler (SEH) chain, enabling the attacker to execute arbitrary code within the context of the FDM process. This vulnerability can be exploited locally by tricking a user into importing a malicious file.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious <code>.url</code> file containing an overly long <code>Location</code> header value designed to cause a buffer overflow.</li>
<li>The victim is convinced to download the malicious <code>.url</code> file (e.g., through social engineering).</li>
<li>The victim opens Free Download Manager 2.0 Built 417.</li>
<li>The victim navigates to &ldquo;File &gt; Import &gt; Import lists of downloads&rdquo; within FDM.</li>
<li>The victim selects the downloaded malicious <code>.url</code> file and initiates the import process.</li>
<li>FDM parses the malicious <code>.url</code> file and attempts to process the long <code>Location</code> header.</li>
<li>The excessively long <code>Location</code> header causes a buffer overflow, overwriting the SEH chain.</li>
<li>When an exception is triggered (due to the overflow), the overwritten SEH chain is used to redirect execution to attacker-controlled code, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows an attacker to execute arbitrary code on the victim&rsquo;s system with the privileges of the Free Download Manager process. This could lead to complete system compromise, data theft, or installation of malware. While specific victim counts are unavailable, the vulnerability poses a significant risk to users of Free Download Manager 2.0 Built 417.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for process creation events originating from Free Download Manager after importing a <code>.url</code> file to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Free Download Manager Suspicious Process Creation After Import&rdquo;).</li>
<li>Implement file integrity monitoring (FIM) on the Free Download Manager executable directory to detect unauthorized modifications potentially related to exploitation.</li>
<li>Consider using application control solutions to restrict the execution of unsigned or untrusted code within the Free Download Manager process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category><category>cve-2018-25304</category></item><item><title>Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-04-easy-mpeg-seh-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-easy-mpeg-seh-overflow/</guid><description>Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.</description><content:encoded><![CDATA[<p>Easy MPEG to DVD Burner 1.7.11 is vulnerable to a structured exception handling (SEH) local buffer overflow. This vulnerability allows a local attacker to execute arbitrary code on a targeted system. The vulnerability can be triggered by supplying a malicious username string to the application. The attacker exploits this vulnerability by overwriting the SEH handler, redirecting execution flow to attacker-controlled shellcode, which can then execute arbitrary commands. This vulnerability exists due to insufficient bounds checking when handling user-supplied data, specifically the username. Successful exploitation allows for arbitrary code execution within the context of the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious input string designed to trigger a buffer overflow in Easy MPEG to DVD Burner 1.7.11.</li>
<li>The malicious string includes junk data to fill the buffer, SEH chain pointers to control the exception handling process, and shellcode containing the attacker&rsquo;s desired commands.</li>
<li>The attacker provides the crafted input as a username during application execution, likely via a configuration file or command-line argument.</li>
<li>The application&rsquo;s vulnerable code attempts to copy the attacker-controlled username into a fixed-size buffer without proper bounds checking.</li>
<li>The buffer overflows, overwriting the SEH handler with the attacker-controlled SEH chain pointers.</li>
<li>An exception is triggered within the application due to the buffer overflow, causing the SEH handler to be invoked.</li>
<li>The overwritten SEH handler redirects execution to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes arbitrary commands, such as launching calc.exe, giving the attacker control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running Easy MPEG to DVD Burner 1.7.11. This can lead to complete system compromise, data theft, or denial of service. While there is no mention of the number of victims or specific sectors targeted in the provided document, the high CVSS score (8.4) indicates a significant risk. The impact would allow lateral movement and further compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block execution of Easy MPEG to DVD Burner 1.7.11 if it is not a required application.</li>
<li>Monitor process creations for unusual processes originating from Easy MPEG to DVD Burner using the process creation rule below.</li>
<li>Monitor for unexpected process execution, such as calc.exe (mentioned in the advisory), following the execution of Easy MPEG to DVD Burner 1.7.11.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer overflow</category><category>seh overflow</category><category>cve-2018-25301</category></item><item><title>Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</guid><description>Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability exists in Allok Video to DVD Burner version 2.6.1217. This vulnerability, identified as CVE-2018-25303, resides within the &ldquo;License Name&rdquo; field of the application. A local attacker can exploit this flaw by crafting a malicious input designed to overwrite the Structured Exception Handler (SEH). Successful exploitation enables the attacker to execute arbitrary code within the context of the application. The vulnerability was reported on 2026-04-29. This is important for defenders because successful exploitation can lead to complete system compromise on vulnerable machines.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Allok Video to DVD Burner 2.6.1217 installed.</li>
<li>The attacker crafts a malicious input string consisting of 780 bytes of arbitrary data.</li>
<li>The attacker appends SEH chain pointers and shellcode to the crafted input string.</li>
<li>The attacker opens the Allok Video to DVD Burner application and navigates to the registration window.</li>
<li>The attacker pastes the malicious input string into the &ldquo;License Name&rdquo; field.</li>
<li>The application attempts to process the oversized input, triggering the buffer overflow.</li>
<li>The SEH is overwritten with the attacker&rsquo;s controlled pointers.</li>
<li>The shellcode is executed, giving the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code within the context of the Allok Video to DVD Burner application. This could lead to complete system compromise, including data theft, installation of malware, or other malicious activities. The vulnerability affects version 2.6.1217 of the software. The number of potential victims depends on the number of installations of the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for Allok Video to DVD Burner and unusual child processes using the process creation rule below.</li>
<li>Monitor for registry modifications performed by the vulnerable application that may indicate persistence.</li>
<li>Due to the age of the application, consider whether it should continue to be used within the environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer overflow</category><category>seh overwrite</category></item><item><title>Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-buffer-overflow/</guid><description>Allok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.</description><content:encoded><![CDATA[<p>Allok AVI to DVD SVCD VCD Converter version 4.0.1217 is susceptible to a structured exception handling (SEH) based buffer overflow vulnerability. This vulnerability enables a local attacker to execute arbitrary code by crafting a specific payload. The attack involves providing a malicious string in the License Name field of the application. This can be exploited without requiring any prior authentication, making it a significant security concern for systems running the vulnerable software. The vulnerability was reported on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker prepares a malicious string payload consisting of junk data, an NSEH bypass, an SEH handler address, and shellcode.</li>
<li>The attacker opens the Allok AVI to DVD SVCD VCD Converter application.</li>
<li>The attacker navigates to the registration or license activation section of the software.</li>
<li>The attacker pastes the malicious string into the License Name field.</li>
<li>The attacker clicks the &ldquo;Register&rdquo; button, triggering the buffer overflow.</li>
<li>The overflow overwrites the SEH frame, redirecting execution flow to the attacker-controlled NSEH bypass.</li>
<li>The NSEH bypass redirects execution to the SEH handler address, which points to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes, allowing the attacker to run arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running the Allok AVI to DVD SVCD VCD Converter. This could lead to complete system compromise, data theft, or installation of malware. Given the ease of exploitation (no authentication required, local access only) this poses a significant risk to systems with the vulnerable software installed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Allok AVI Converter SEH Buffer Overflow</code> to detect exploitation attempts based on process creation events.</li>
<li>Monitor for abnormal process execution originating from the Allok AVI to DVD SVCD VCD Converter application to identify potential exploitation (process_creation).</li>
<li>Consider removing the Allok AVI to DVD SVCD VCD Converter 4.0.1217 until a patch is available, due to the high severity and ease of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh</category><category>cve-2018-25302</category></item><item><title>D-Link DIR-825M Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</link><pubDate>Tue, 28 Apr 2026 15:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-buffer-overflow/</guid><description>D-Link DIR-825M version 1.1.12 is vulnerable to a buffer overflow via manipulation of the submit-url argument in the /boafrm/formWanConfigSetup file's sub_414BA8 function, allowing a remote attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability exists in D-Link DIR-825M router version 1.1.12. The vulnerability is located within the <code>sub_414BA8</code> function of the <code>/boafrm/formWanConfigSetup</code> file. An attacker can exploit this flaw by manipulating the <code>submit-url</code> argument, leading to arbitrary code execution on the device. This vulnerability is remotely exploitable, and a proof-of-concept exploit is publicly available, increasing the risk of widespread attacks. Exploitation does not require authentication by default, and could allow an attacker to gain complete control over the device. This poses a significant threat to home and small business networks relying on this router model.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-825M router running firmware version 1.1.12.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
<li>The attacker includes the <code>submit-url</code> argument in the POST request, injecting a buffer overflow payload.</li>
<li>The crafted payload overflows the buffer in the <code>sub_414BA8</code> function during the processing of the <code>submit-url</code> argument.</li>
<li>The buffer overflow overwrites critical memory regions, including the return address.</li>
<li>When the <code>sub_414BA8</code> function returns, control is redirected to the attacker-controlled address.</li>
<li>The attacker&rsquo;s payload executes arbitrary code, potentially downloading and executing a secondary payload.</li>
<li>The attacker gains remote shell access to the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the D-Link DIR-825M router. This can lead to complete compromise of the device, allowing the attacker to eavesdrop on network traffic, modify router settings, or use the router as a botnet node for further malicious activities. Given the widespread use of D-Link routers in home and small business networks, a successful attack could compromise a large number of devices and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from D-Link to patch CVE-2026-7289.</li>
<li>Deploy the following Sigma rule to detect suspicious POST requests to <code>/boafrm/formWanConfigSetup</code> with overly long <code>submit-url</code> parameters.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/boafrm/formWanConfigSetup</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>router</category><category>dlink</category><category>cve</category></item><item><title>Tenda HG3 v2.0 Stack-Based Buffer Overflow in formUploadConfig</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-overflow/</guid><description>A stack-based buffer overflow vulnerability in the formUploadConfig function of Tenda HG3 v2.0's /boaform/formIPv6Routing file allows remote attackers to execute arbitrary code by manipulating the destNet argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda HG3 version 2.0. The vulnerability exists within the <code>formUploadConfig</code> function of the <code>/boaform/formIPv6Routing</code> file. A remote attacker can exploit this by manipulating the <code>destNet</code> argument, potentially leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-7151, has a publicly available exploit, increasing the risk of exploitation. This poses a significant threat to users of Tenda HG3 v2.0 routers, potentially allowing attackers to gain unauthorized access and control over the device. The CVSS v3.1 score is rated as 8.8 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda HG3 v2.0 router with default or known credentials, or no authentication at all.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/boaform/formIPv6Routing</code>.</li>
<li>The request targets the <code>formUploadConfig</code> function.</li>
<li>The <code>destNet</code> argument within the HTTP POST data is manipulated with a string exceeding the buffer size.</li>
<li>The <code>formUploadConfig</code> function processes the oversized <code>destNet</code> argument without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions on the stack.</li>
<li>The attacker gains arbitrary code execution on the device by overwriting the return address or other critical data on the stack.</li>
<li>The attacker can then leverage this to gain full control of the device, potentially modifying settings, injecting malware, or using it as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda HG3 v2.0 router. This could lead to complete compromise of the device, allowing the attacker to monitor network traffic, change router settings, or use the device as a launchpad for further attacks against other devices on the network. Given the potential for widespread exploitation due to the publicly available exploit, a large number of Tenda HG3 v2.0 users are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual POST requests to <code>/boaform/formIPv6Routing</code> with excessively long <code>destNet</code> parameters to detect potential exploit attempts (see example Sigma rule below).</li>
<li>Implement rate limiting for requests to <code>/boaform/formIPv6Routing</code> to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches or firmware updates from Tenda to address CVE-2026-7151 on vulnerable HG3 2.0 devices.</li>
<li>Consider deploying a web application firewall (WAF) rule to filter out malicious requests targeting the <code>destNet</code> parameter in <code>/boaform/formIPv6Routing</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7151</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>D-Link DI-8100 Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</link><pubDate>Tue, 28 Apr 2026 09:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-di-8100-bo/</guid><description>A buffer overflow vulnerability in the D-Link DI-8100 router allows remote attackers to execute arbitrary code by manipulating the 'fn' argument in the tgfile_htm function of the CGI endpoint.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7248, affects the D-Link DI-8100 router, specifically version 16.07.26A1. The vulnerability resides within the <code>tgfile_htm</code> function of the <code>tgfile.htm</code> file, a component of the CGI endpoint. By crafting a malicious request targeting the <code>fn</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. This vulnerability is particularly concerning as a proof-of-concept exploit has been publicly released, increasing the likelihood of exploitation. Routers are often targeted due to their exposure to the internet and the potential to compromise entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DI-8100 router running firmware version 16.07.26A1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tgfile.htm</code> CGI endpoint.</li>
<li>The malicious request includes an overly long string in the <code>fn</code> argument.</li>
<li>The router&rsquo;s web server processes the request and passes the <code>fn</code> argument to the <code>tgfile_htm</code> function.</li>
<li>The <code>tgfile_htm</code> function fails to properly validate the length of the <code>fn</code> argument.</li>
<li>A buffer overflow occurs when the overly long <code>fn</code> argument is copied into a fixed-size buffer.</li>
<li>The buffer overflow overwrites adjacent memory, potentially including return addresses or other critical data.</li>
<li>The attacker gains arbitrary code execution on the router, potentially allowing them to take full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to remotely execute arbitrary code on the D-Link DI-8100 router. This could lead to a complete compromise of the device, allowing the attacker to intercept network traffic, modify router settings, or use the router as a launchpad for further attacks against other devices on the network. Given the public availability of an exploit, widespread exploitation is possible, potentially affecting numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for abnormally long <code>fn</code> parameters in requests to <code>/tgfile.htm</code> using the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement rate limiting on HTTP requests to the router&rsquo;s web interface to mitigate brute-force exploitation attempts.</li>
<li>Since the source material only identifies a vulnerability, without a patch, consider replacing the affected device.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7248</category><category>buffer-overflow</category><category>d-link</category><category>router</category></item><item><title>Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-n300rt-bo/</link><pubDate>Tue, 28 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-n300rt-bo/</guid><description>A remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7219, has been discovered in Totolink N300RT router firmware version 3.4.0-B20250430. The vulnerability resides within the <code>/boafrm/formIpQoS</code> file and is triggered by manipulating the <code>entry_name</code> argument. An attacker can exploit this flaw remotely to potentially execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to devices running the affected firmware, potentially allowing attackers to gain unauthorized access and control over the router.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Totolink N300RT device running firmware version 3.4.0-B20250430.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boafrm/formIpQoS</code> file.</li>
<li>The crafted request includes a payload designed to overflow the buffer associated with the <code>entry_name</code> argument.</li>
<li>The router&rsquo;s web server processes the malicious request, leading to a buffer overflow condition.</li>
<li>The attacker overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>Upon function return, the overwritten return address is used, diverting execution flow to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
<li>The attacker can then use this access to modify router settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Totolink N300RT device. This could lead to complete compromise of the router, enabling attackers to monitor network traffic, change DNS settings, or use the device as part of a botnet. Given the number of Totolink N300RT devices deployed, this vulnerability could have a widespread impact, especially for home and small business users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests targeting <code>/boafrm/formIpQoS</code> with unusually long <code>entry_name</code> parameters to detect potential exploitation attempts. Implement the Sigma rule <code>Detect Suspicious Totolink FormIpQoS Requests</code>.</li>
<li>Apply firmware updates as soon as they are released by Totolink to patch CVE-2026-7219.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other devices on the network.</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests targeting the router&rsquo;s web interface and activate the <code>Detect Large POST Requests to Router Config Pages</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve-2026-7219</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability (CVE-2026-7101)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</link><pubDate>Mon, 27 Apr 2026 09:19:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f456-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 version 1.0.0.5 allows remote attackers to execute arbitrary code via a crafted request to the fromWrlclientSet function in the /goform/WrlclientSet file of the httpd component.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7101, has been discovered in Tenda F456 router version 1.0.0.5. The vulnerability resides in the <code>fromWrlclientSet</code> function within the <code>/goform/WrlclientSet</code> file, which is part of the router&rsquo;s httpd component. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to home and small business networks using the affected Tenda router model, potentially leading to complete device compromise and unauthorized network access. The vulnerability was published on 2026-04-27 and is tracked by VulDB.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda F456 router running firmware version 1.0.0.5.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>The crafted request includes an oversized payload designed to overflow the buffer in the <code>fromWrlclientSet</code> function.</li>
<li>The <code>httpd</code> process attempts to process the request without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions, including critical program data and execution pointers.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially including shell commands or custom malware.</li>
<li>The attacker achieves complete control of the router, potentially enabling network reconnaissance, data exfiltration, or further attacks on the local network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda F456 router. This can lead to complete device compromise, allowing the attacker to control network traffic, modify router settings, or use the compromised device as a pivot point for further attacks within the network. Given the wide usage of Tenda routers in home and small business environments, a successful widespread exploitation could impact thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched firmware version if available from the vendor.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/goform/WrlclientSet</code> endpoint using the provided Sigma rule.</li>
<li>Implement an IPS rule to detect and block exploit attempts targeting CVE-2026-7101.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7101</category><category>buffer-overflow</category><category>router</category><category>tenda</category><category>remote-code-execution</category></item><item><title>Tenda F456 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</link><pubDate>Sun, 26 Apr 2026 11:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-buffer-overflow/</guid><description>A buffer overflow vulnerability in Tenda F456 router version 1.0.0.5 allows a remote attacker to execute arbitrary code by exploiting the fromSafeClientFilter function in the /goform/SafeClientFilter endpoint through manipulation of the 'menufacturer/Go' argument.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in Tenda F456 router, specifically version 1.0.0.5. The vulnerability resides within the <code>fromSafeClientFilter</code> function located in the <code>/goform/SafeClientFilter</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary code. Publicly available exploit code exists, increasing the risk of widespread exploitation targeting vulnerable Tenda F456 devices. This issue poses a significant threat to network security, as a compromised router can lead to data breaches, denial of service, or further network intrusion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda F456 router running firmware version 1.0.0.5 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>The crafted request includes a specially designed payload within the <code>menufacturer/Go</code> argument. This payload is designed to trigger a buffer overflow in the <code>fromSafeClientFilter</code> function.</li>
<li>The <code>fromSafeClientFilter</code> function processes the malicious input without proper bounds checking.</li>
<li>The oversized payload overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>When the <code>fromSafeClientFilter</code> function attempts to return, the overwritten return address is used, redirecting execution flow to attacker-controlled memory.</li>
<li>The attacker-controlled memory contains shellcode or other malicious instructions.</li>
<li>The router executes the attacker&rsquo;s code, granting the attacker control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can result in complete compromise of the Tenda F456 router. An attacker can gain unauthorized access to network traffic, modify router settings, or use the compromised device as a launchpad for further attacks within the network. Given the public availability of exploit code, a large number of Tenda F456 routers could be targeted, potentially affecting numerous home and small business networks. A successful attack could lead to data theft, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or firmware updates released by Tenda to address CVE-2026-7033 on the F456 1.0.0.5 routers.</li>
<li>Implement network intrusion detection systems (IDS) or intrusion prevention systems (IPS) rules to detect and block malicious requests targeting the <code>/goform/SafeClientFilter</code> endpoint.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/SafeClientFilter</code> with abnormally large <code>menufacturer/Go</code> argument values.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7033</category><category>router</category></item><item><title>Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</link><pubDate>Sat, 25 Apr 2026 18:18:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</guid><description>A buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-6988, has been discovered in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides within the Boa Service, specifically affecting the <code>formRoute</code> function located in the <code>/boaform/formRouting</code> file. Successful exploitation of this flaw enables a remote attacker to overwrite memory by crafting a malicious request with a manipulated <code>nextHop</code> argument. This can lead to arbitrary code execution on the affected device. Given the potential for remote exploitation and the availability of a published exploit, this vulnerability poses a significant threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device with the vulnerable Boa web service exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boaform/formRouting</code> endpoint.</li>
<li>The crafted request includes a specially crafted <code>nextHop</code> argument, exceeding the buffer size allocated for it.</li>
<li>The Boa service processes the request without proper bounds checking on the <code>nextHop</code> argument.</li>
<li>The oversized <code>nextHop</code> argument overwrites adjacent memory regions, including critical program data or return addresses.</li>
<li>The overwritten return address redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code on the device with the privileges of the Boa service.</li>
<li>The attacker gains control of the device, potentially leading to data exfiltration, device hijacking, or further network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6988 can lead to complete compromise of the affected Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device. This may result in unauthorized access to the device&rsquo;s configuration, sensitive data exposure, or the device being used as a bot in a larger attack. Given that this device is likely used in home or small business environments, a successful attack could lead to significant data breaches, financial losses, and reputational damage. The availability of a public exploit increases the likelihood of widespread exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates released by Tenda to address CVE-2026-6988 as soon as possible.</li>
<li>Implement network segmentation to limit the exposure of Tenda devices to the internet or untrusted networks.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/boaform/formRouting</code> endpoint to detect potential exploit attempts (webserver log source).</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG10 Buffer Overflow Attempt&rdquo; to identify malicious HTTP requests exploiting the <code>nextHop</code> argument (Sigma rule).</li>
<li>Implement rate limiting on the <code>/boaform/formRouting</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve-2026-6988</category><category>tenda</category><category>iot</category></item><item><title>rust-openssl Unchecked Callback Length Memory Leak</title><link>https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-memory-leak/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rust-openssl-memory-leak/</guid><description>The rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.</description><content:encoded><![CDATA[<p>The <code>rust-openssl</code> crate, a Rust wrapper for the OpenSSL library, is susceptible to a high-severity vulnerability due to unchecked callback lengths within the FFI trampolines used by several functions related to PSK (Pre-Shared Key) and cookie generation. Specifically, versions 0.9.24 up to (but not including) 0.10.78 are affected. The vulnerable functions include <code>SslContextBuilder::set_psk_client_callback</code>, <code>set_psk_server_callback</code>, <code>set_cookie_generate_cb</code>, and <code>set_stateless_cookie_generate_cb</code>. The issue arises because the user-provided closure&rsquo;s returned <code>usize</code> (size) value is directly passed to OpenSSL without validation against the size of the <code>&amp;mut [u8]</code> buffer provided to the closure, resulting in potential buffer overflows and memory leaks. This allows an attacker to potentially leak adjacent memory regions to a peer.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious application or exploits an existing application using the vulnerable <code>rust-openssl</code> crate.</li>
<li>The attacker triggers one of the vulnerable callback functions (<code>set_psk_client_callback</code>, <code>set_psk_server_callback</code>, <code>set_cookie_generate_cb</code>, or <code>set_stateless_cookie_generate_cb</code>).</li>
<li>The vulnerable callback function executes the user-provided closure.</li>
<li>The user-provided closure returns a <code>usize</code> value indicating the intended length of the data to be written to the output buffer.</li>
<li>The FFI trampoline forwards this <code>usize</code> value directly to OpenSSL, bypassing bounds checking against the actual buffer size.</li>
<li>If the returned <code>usize</code> exceeds the allocated buffer size, OpenSSL writes beyond the buffer boundary, leading to a buffer overflow.</li>
<li>The buffer overflow allows the attacker to read adjacent memory regions or overwrite data, potentially leaking sensitive information or corrupting program state.</li>
<li>Successful exploitation could lead to information disclosure, denial of service, or potentially arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to information disclosure, denial of service, or potentially arbitrary code execution. Given the widespread use of the <code>rust-openssl</code> crate in various applications, the impact could be significant, affecting numerous services and potentially exposing sensitive data. The vulnerability allows for memory leakage to peers which could have broad consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>rust-openssl</code> version 0.10.78 or later to patch the vulnerability (reference: <a href="https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78)">https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78)</a>.</li>
<li>Implement input validation and sanitization within user-provided closures to ensure that the returned <code>usize</code> value does not exceed the allocated buffer size, mitigating the risk even in vulnerable versions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rust</category><category>openssl</category><category>memory leak</category><category>buffer overflow</category></item><item><title>LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-lanspy-buffer-overflow/</link><pubDate>Wed, 22 Apr 2026 16:16:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lanspy-buffer-overflow/</guid><description>LanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.</description><content:encoded><![CDATA[<p>LanSpy version 2.0.1.159 is susceptible to a local buffer overflow vulnerability (CVE-2018-25268). This vulnerability, reported in April 2026, stems from insufficient input validation within the application&rsquo;s scan field. An attacker, with local access to a vulnerable system, can exploit this flaw by crafting a specific payload designed to overwrite the instruction pointer. This can lead to application crashes or, more seriously, the potential execution of arbitrary code. The vulnerability exists because the application does not properly handle oversized input to the scan field.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a system with LanSpy 2.0.1.159 installed.</li>
<li>The attacker crafts a malicious payload consisting of 688 bytes of padding.</li>
<li>The attacker appends 4 bytes of controlled data (representing the desired instruction pointer overwrite) to the padding.</li>
<li>The attacker inputs this crafted payload into the &ldquo;scan field&rdquo; of the LanSpy application.</li>
<li>Due to the buffer overflow vulnerability, the oversized input overwrites the application&rsquo;s buffer on the stack.</li>
<li>The 4 bytes of controlled data overwrite the instruction pointer (EIP on x86 architectures).</li>
<li>When the application attempts to return from the vulnerable function, it jumps to the address specified by the attacker-controlled instruction pointer.</li>
<li>This jump can lead to a crash or, if the attacker provides a valid address containing malicious code, code execution within the context of the LanSpy application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to potentially execute arbitrary code on the affected system with the privileges of the user running LanSpy. While the exploit requires local access, it can be leveraged to escalate privileges or establish persistence on the compromised machine. There are no reliable victim counts or sectors targeted available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Due to the age of this software and the lack of available patches, consider uninstalling LanSpy 2.0.1.159 from systems where it is present.</li>
<li>Monitor process execution for unexpected crashes of LanSpy using the <code>process_creation</code> log source to identify exploitation attempts.</li>
<li>Deploy the Sigma rule to detect potential buffer overflow exploitation attempts by monitoring for abnormally large inputs to the LanSpy process in <code>process_creation</code> logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25268</category></item><item><title>H3C Magic B1 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-b1-overflow/</link><pubDate>Sun, 19 Apr 2026 23:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-b1-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6581) in H3C Magic B1 routers allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the SetMobileAPInfoById function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-6581, affects H3C Magic B1 routers up to version 100R004. The vulnerability resides in the <code>SetMobileAPInfoById</code> function within the <code>/goform/aspForm</code> file. An attacker can exploit this flaw by crafting a malicious request that manipulates the <code>param</code> argument, leading to a buffer overflow and potential remote code execution. This vulnerability is particularly concerning because a public exploit is available, increasing the risk of widespread exploitation. The vendor was notified about the vulnerability but has not responded. Given the ease of exploitation and the potential for complete system compromise, organizations using affected H3C routers should take immediate action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable H3C Magic B1 router running a firmware version up to 100R004.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/aspForm</code> endpoint.</li>
<li>The request includes the <code>SetMobileAPInfoById</code> function call with an overly long value for the <code>param</code> argument, triggering the buffer overflow.</li>
<li>The overflow overwrites adjacent memory regions, including the return address on the stack.</li>
<li>The attacker sets the overwritten return address to point to attacker-controlled code or a ROP chain.</li>
<li>When the <code>SetMobileAPInfoById</code> function returns, execution jumps to the attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes with elevated privileges, potentially allowing full control of the router.</li>
<li>The attacker can then use the compromised router to establish a foothold within the network, exfiltrate data, or launch further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6581 allows a remote attacker to execute arbitrary code with root privileges on the H3C Magic B1 router. This can lead to complete compromise of the device, allowing the attacker to control network traffic, exfiltrate sensitive data, or use the router as a jumping-off point for further attacks within the network. Given the widespread use of these routers in small to medium-sized businesses and homes, a large number of devices are potentially vulnerable. There is no indication of victim counts or sectors targeted at this time.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect H3C Magic B1 Buffer Overflow Attempt</code> to your SIEM to detect exploitation attempts targeting CVE-2026-6581 via suspicious HTTP POST requests to <code>/goform/aspForm</code> (see Sigma rule below).</li>
<li>Apply appropriate input validation and sanitization measures if you manage the web server to mitigate buffer overflows.</li>
<li>Monitor network traffic for unusual activity originating from H3C Magic B1 routers.</li>
<li>Consider replacing H3C Magic B1 routers with more secure alternatives if updates are not available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6581</category><category>buffer-overflow</category><category>router</category><category>h3c</category></item><item><title>H3C Magic B0 Router Buffer Overflow Vulnerability (CVE-2026-6560)</title><link>https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-buffer-overflow/</link><pubDate>Sun, 19 Apr 2026 07:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6560) in H3C Magic B0 up to 100R002 allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the Edit_BasicSSID function of the /goform/aspForm file.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability (CVE-2026-6560) has been identified in H3C Magic B0 routers, specifically in versions up to 100R002. The vulnerability resides within the <code>Edit_BasicSSID</code> function of the <code>/goform/aspForm</code> file. An attacker can remotely exploit this flaw by crafting malicious input to the <code>param</code> argument, leading to arbitrary code execution on the device. Public exploits are reportedly available, increasing the risk of widespread exploitation. The vendor was notified about this vulnerability, but has not provided any response or patch as of April 2026. This poses a significant risk to users of the affected H3C Magic B0 routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable H3C Magic B0 router running firmware version 100R002 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/aspForm</code> endpoint.</li>
<li>The POST request includes the <code>Edit_BasicSSID</code> function call.</li>
<li>The <code>param</code> argument within the POST data contains a specially crafted string exceeding the buffer size allocated in the <code>Edit_BasicSSID</code> function.</li>
<li>The buffer overflow occurs when the <code>Edit_BasicSSID</code> function processes the oversized <code>param</code> argument without proper bounds checking.</li>
<li>The overflow overwrites adjacent memory regions, potentially including the return address on the stack.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device, exfiltrating data, or using it as a pivot point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-6560) allows a remote attacker to execute arbitrary code on the affected H3C Magic B0 router. This could lead to a complete compromise of the device, including the ability to modify router settings, intercept network traffic, and potentially gain access to connected devices on the network. Given the availability of public exploits, widespread exploitation is possible, potentially impacting a large number of home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/aspForm</code> with unusually long <code>param</code> arguments (refer to the Attack Chain section).</li>
<li>Implement rate limiting for requests to <code>/goform/aspForm</code> to mitigate potential exploitation attempts (refer to the Attack Chain section).</li>
<li>Deploy the following Sigma rule to detect exploitation attempts targeting the vulnerable <code>Edit_BasicSSID</code> function.</li>
<li>Block network traffic originating from or destined to H3C Magic B0 devices until a patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-6560</category><category>h3c</category><category>router</category><category>network device</category></item><item><title>Firebird Database Server Slice Packet Deserialization Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-04-firebird-overflow/</link><pubDate>Fri, 17 Apr 2026 19:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-firebird-overflow/</guid><description>Firebird versions before 5.0.4, 4.0.7, and 3.0.14 are vulnerable to a buffer overflow in the xdr_datum() function during slice packet deserialization, enabling unauthenticated attackers to cause a crash or potentially achieve arbitrary code execution by sending a malicious packet.</description><content:encoded><![CDATA[<p>Firebird, a widely used open-source relational database management system, is susceptible to a critical buffer overflow vulnerability. Present in versions prior to 5.0.4, 4.0.7, and 3.0.14, the vulnerability resides within the <code>xdr_datum()</code> function, responsible for deserializing slice packets. This function fails to adequately validate the length of cstring data against the slice descriptor bounds. Consequently, an attacker can craft a malicious packet containing an oversized cstring, leading to a buffer overflow. An unauthenticated attacker exploiting this vulnerability can send a crafted packet to the Firebird server, potentially causing a denial-of-service condition via a crash or, more seriously, achieving arbitrary code execution on the affected system. Organizations utilizing vulnerable Firebird versions are urged to upgrade to versions 5.0.4, 4.0.7, or 3.0.14 to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Firebird server running a vulnerable version (prior to 5.0.4, 4.0.7, or 3.0.14).</li>
<li>The attacker crafts a malicious slice packet designed to exploit the <code>xdr_datum()</code> function&rsquo;s insufficient bounds checking. This packet includes an overly long cstring.</li>
<li>The attacker establishes a network connection to the Firebird server.</li>
<li>The attacker transmits the crafted malicious slice packet to the Firebird server.</li>
<li>The Firebird server&rsquo;s <code>xdr_datum()</code> function processes the malicious packet without proper cstring length validation.</li>
<li>The oversized cstring overflows the allocated buffer during deserialization.</li>
<li>The buffer overflow corrupts adjacent memory regions, potentially overwriting critical data structures or executable code.</li>
<li>Depending on the overwritten memory, the server either crashes, leading to denial of service, or the attacker achieves arbitrary code execution, enabling them to gain control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to a denial-of-service condition due to a server crash, disrupting database services and impacting applications reliant on the Firebird database. In a more severe scenario, an attacker could gain arbitrary code execution on the server, allowing them to potentially steal sensitive data, compromise the integrity of the database, or use the compromised server as a launchpad for further attacks within the network. While specific victim counts are unavailable, the widespread use of Firebird implies a significant potential impact across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Firebird servers to versions 5.0.4, 4.0.7, or 3.0.14 to patch CVE-2026-33337 and eliminate the buffer overflow vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Firebird Slice Packet Overflow Attempt&rdquo; to identify potential exploitation attempts based on anomalous network traffic patterns.</li>
<li>Monitor network traffic for connections to Firebird servers originating from unexpected or untrusted sources to detect potential reconnaissance or exploitation attempts. Enable network connection logging to support this monitoring.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-33337</category><category>firebird</category><category>buffer-overflow</category><category>denial-of-service</category></item><item><title>Openfind MailGates/MailAudit Stack-based Buffer Overflow (CVE-2026-6350)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openfind-mailgates-bo/</link><pubDate>Thu, 16 Apr 2026 03:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openfind-mailgates-bo/</guid><description>Openfind MailGates/MailAudit is vulnerable to a stack-based buffer overflow (CVE-2026-6350) allowing unauthenticated remote attackers to execute arbitrary code by controlling the program's execution flow.</description><content:encoded><![CDATA[<p>Openfind MailGates and MailAudit are susceptible to a critical stack-based buffer overflow vulnerability, identified as CVE-2026-6350. This flaw allows unauthenticated remote attackers to gain control over the program&rsquo;s execution flow and execute arbitrary code on the affected system. The vulnerability stems from insufficient input validation, leading to a buffer overflow when processing specifically crafted requests. Given the nature of MailGates/MailAudit as email security solutions, successful exploitation can lead to a full compromise of the email infrastructure and potential data breaches. The vulnerability was reported on April 15, 2026, and affects undisclosed versions of MailGates/MailAudit.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated remote attacker identifies a vulnerable MailGates/MailAudit instance.</li>
<li>The attacker crafts a malicious network request specifically designed to trigger the stack-based buffer overflow in MailGates/MailAudit.</li>
<li>The attacker sends the crafted request to the targeted MailGates/MailAudit server.</li>
<li>The vulnerable application receives and processes the malicious request without proper input sanitization.</li>
<li>The oversized input overwrites adjacent memory on the stack, including the return address.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker.</li>
<li>The attacker-controlled address points to shellcode injected within the overflowing buffer or elsewhere in memory.</li>
<li>The shellcode executes arbitrary commands on the server, potentially leading to complete system compromise and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6350 allows unauthenticated remote attackers to execute arbitrary code on the MailGates/MailAudit server. This can result in full system compromise, allowing attackers to steal sensitive email data, modify email content, or use the compromised server as a launchpad for further attacks. Given that MailGates/MailAudit are used by numerous organizations for email security, a successful widespread attack could impact potentially thousands of organizations and millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for unusual request patterns indicative of buffer overflow attempts targeting MailGates/MailAudit.</li>
<li>Inspect network traffic for suspicious payloads being sent to MailGates/MailAudit servers, looking for patterns that could indicate exploit attempts.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts targeting CVE-2026-6350.</li>
<li>Consult Openfind&rsquo;s security advisories for patches and mitigation steps specific to CVE-2026-6350.</li>
<li>If available apply updates provided by Openfind to remediate CVE-2026-6350 on the MailGates/MailAudit servers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6350</category><category>buffer-overflow</category><category>remote-code-execution</category></item><item><title>GIMP GIF Image Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-gimp-gif-overflow/</link><pubDate>Wed, 15 Apr 2026 20:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gimp-gif-overflow/</guid><description>A buffer overflow vulnerability in the GIF image loading component of GIMP allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file, potentially leading to denial of service or arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-6384, has been identified in the GIF image loading component of GIMP (GNU Image Manipulation Program). The vulnerability resides within the <code>ReadJeffsImage</code> function. An attacker can exploit this flaw by crafting a malicious GIF file that, when processed by GIMP, causes a write operation beyond the allocated buffer. Successful exploitation can result in a denial of service (DoS) condition or, potentially, arbitrary code execution. This vulnerability poses a risk to systems where GIMP is used to process potentially untrusted GIF files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious GIF file designed to trigger the buffer overflow.</li>
<li>The attacker delivers the malicious GIF file to a target user, potentially through social engineering or a compromised website.</li>
<li>The user opens the malicious GIF file with GIMP.</li>
<li>GIMP&rsquo;s <code>ReadJeffsImage</code> function attempts to process the malformed GIF data.</li>
<li>The <code>ReadJeffsImage</code> function writes beyond the bounds of an allocated buffer due to insufficient size validation.</li>
<li>This buffer overflow overwrites adjacent memory regions.</li>
<li>If the overwritten memory contains critical program data or executable code, it can lead to a denial of service.</li>
<li>In a more sophisticated attack, the overflow could be carefully crafted to overwrite execution flow and achieve arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-6384) can lead to a denial-of-service condition, crashing the GIMP application and preventing users from processing images. More critically, it can potentially allow an attacker to execute arbitrary code on the affected system, leading to complete system compromise. The vulnerability affects any system where a user opens a malicious GIF file using a vulnerable version of GIMP.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches provided by GIMP to address CVE-2026-6384.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousGimpProcess</code> to detect potential exploitation attempts based on process execution (log source: <code>process_creation</code>).</li>
<li>Monitor file access events (<code>file_event</code>) for GIMP accessing unusual or temporary file locations when opening GIF files.</li>
<li>Educate users to be cautious when opening GIF files from untrusted sources to mitigate initial access vectors.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6384</category><category>gimp</category><category>buffer-overflow</category><category>dos</category></item><item><title>CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-32195-windows-kernel-privilege-escalation/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-32195-windows-kernel-privilege-escalation/</guid><description>CVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-32195 is a high-severity vulnerability affecting the Windows Kernel. This stack-based buffer overflow can be exploited by an attacker with local access to elevate their privileges. The vulnerability was published on April 14, 2026. The vulnerability exists within the Windows Kernel, a core component of the operating system, making it a critical target for exploitation. Successful exploitation could lead to complete system compromise, allowing the attacker to perform any action on the system. While the exact details of the vulnerable code are not provided in the source material, the nature of a stack-based buffer overflow suggests careful memory manipulation is required for successful exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with standard user privileges.</li>
<li>Attacker identifies the presence of CVE-2026-32195 in the target Windows Kernel version.</li>
<li>Attacker crafts a malicious payload designed to overflow the stack buffer when processed by the vulnerable kernel function.</li>
<li>The attacker executes a program or triggers a specific kernel function call that processes the crafted payload.</li>
<li>The overflow overwrites critical return addresses or other sensitive data on the stack.</li>
<li>The overwritten return address redirects execution to attacker-controlled code, allowing for arbitrary code execution within the kernel context.</li>
<li>The attacker&rsquo;s code executes with elevated privileges, such as SYSTEM.</li>
<li>Attacker leverages elevated privileges to install malware, modify system configurations, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32195 allows an attacker to elevate their privileges from a standard user to SYSTEM. This grants the attacker complete control over the compromised system, enabling them to install malicious software, steal sensitive data, or disrupt critical services. The impact is severe, as it bypasses normal access controls and allows for unrestricted access to system resources. While the exact number of potential victims is unknown, all Windows systems with the vulnerable kernel version are susceptible to this attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch released by Microsoft to address CVE-2026-32195 as soon as possible. The update is available through the Microsoft Security Response Center (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32195</a>).</li>
<li>Monitor systems for unexpected kernel-level modifications or privilege escalation attempts using endpoint detection and response (EDR) solutions.</li>
<li>Enable Sysmon process creation logging to detect suspicious processes spawned by kernel exploits to activate the first Sigma rule below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>buffer-overflow</category><category>windows</category><category>cve-2026-32195</category></item><item><title>Microsoft Graphics Component Heap-based Buffer Overflow Vulnerability (CVE-2026-32221)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ms-graphics-overflow/</link><pubDate>Tue, 14 Apr 2026 18:17:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ms-graphics-overflow/</guid><description>CVE-2026-32221 is a heap-based buffer overflow vulnerability in the Microsoft Graphics Component, allowing a local attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>CVE-2026-32221 describes a heap-based buffer overflow vulnerability residing within the Microsoft Graphics Component. This flaw allows an attacker with local access to execute arbitrary code on a vulnerable system. The vulnerability stems from improper handling of memory allocation within the graphics component when processing malformed or specially crafted image files or graphics data. An unauthenticated, local attacker could exploit this vulnerability to gain elevated privileges or potentially take control of the targeted system. The vulnerability was published on April 14, 2026, and defenders should promptly investigate and apply applicable patches as provided by Microsoft.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious image file or graphic data specifically designed to trigger the buffer overflow in the Microsoft Graphics Component.</li>
<li>The attacker must gain local access to a vulnerable system. This could be achieved through various means, such as social engineering or exploiting other existing vulnerabilities.</li>
<li>The attacker triggers the vulnerable graphics component to process the malicious image file or graphic data through a local application that uses the component.</li>
<li>The Microsoft Graphics Component attempts to allocate memory to process the crafted image, but the size calculation is flawed.</li>
<li>The component writes data beyond the allocated buffer on the heap due to the buffer overflow.</li>
<li>This overwrite corrupts adjacent heap memory, potentially overwriting critical data structures or function pointers.</li>
<li>The attacker gains control of the program execution flow by overwriting function pointers with malicious code addresses.</li>
<li>The attacker executes arbitrary code within the context of the application using the graphics component, potentially leading to privilege escalation or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32221 allows a local attacker to execute arbitrary code on the target system. Given the high CVSS score (8.4), this vulnerability poses a significant risk. If successfully exploited, an attacker could potentially gain complete control of the compromised system, leading to data theft, malware installation, or denial of service. The impact is significant for any system utilizing the vulnerable Microsoft Graphics Component, affecting both workstations and servers. The scope of the impact is limited to local access, but it can be a stepping stone for more far-reaching attacks if combined with other vulnerabilities or social engineering techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security updates released by Microsoft to address CVE-2026-32221 on all affected systems immediately, as referenced in the advisory URL.</li>
<li>Enable and review process creation logs for unexpected processes spawned by applications that use the Microsoft Graphics Component to identify potential exploitation attempts.</li>
<li>Implement the provided Sigma rule to detect suspicious process execution following a crash or error related to graphics processing.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32221</category><category>buffer-overflow</category><category>local-privilege-escalation</category><category>graphics-component</category></item><item><title>CVE-2026-26176 Windows CSC Driver Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-csc-privesc/</link><pubDate>Tue, 14 Apr 2026 18:16:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-csc-privesc/</guid><description>CVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-26176 is a critical security vulnerability affecting the Windows Client Side Caching driver (csc.sys). The vulnerability is a heap-based buffer overflow that can be exploited by an authorized, local attacker to gain elevated privileges on the system. The specific version of the driver affected is not detailed, but the vulnerability was disclosed and patched in April 2026. A successful exploit could allow an attacker to perform actions with elevated privileges, potentially leading to full system compromise. This vulnerability highlights the importance of keeping Windows systems up-to-date with the latest security patches to mitigate the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system with low privileges through legitimate means.</li>
<li>The attacker crafts a malicious input designed to trigger the heap-based buffer overflow in csc.sys.</li>
<li>The attacker interacts with the Client Side Caching driver (csc.sys) via a local API call, passing the malicious input.</li>
<li>The malicious input overwrites adjacent memory on the heap due to the buffer overflow.</li>
<li>The attacker carefully manipulates the overwritten memory to gain control of critical system structures.</li>
<li>The attacker leverages the controlled memory to overwrite function pointers within the kernel.</li>
<li>The attacker triggers the execution of the overwritten function pointer, redirecting control to attacker-supplied code.</li>
<li>The attacker&rsquo;s code executes with elevated privileges, allowing the attacker to perform privileged actions on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26176 allows a local attacker with low privileges to escalate their privileges to SYSTEM. This could lead to complete system compromise, including the installation of malware, exfiltration of sensitive data, or disruption of critical services. While the number of affected systems is currently unknown, all unpatched Windows systems are potentially vulnerable. Organizations that do not promptly apply the security update released by Microsoft are at significant risk of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Microsoft security update released to address CVE-2026-26176 on all affected Windows systems immediately. The specific update can be found on the Microsoft Security Response Center (MSRC) at <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26176</a>.</li>
<li>Monitor for abnormal behavior of the csc.exe process using the &ldquo;Detect Suspicious Csc.exe Process Creation&rdquo; Sigma rule to detect potential exploitation attempts.</li>
<li>Enable process creation auditing with command line arguments to ensure the Sigma rules can detect malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>buffer-overflow</category><category>windows</category></item><item><title>Totolink A3002MU Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-a3002mu-bo/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-a3002mu-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6194) exists in the Totolink A3002MU B20211125.1046 router firmware, specifically affecting the `/boafrm/formWlanSetup` component's HTTP request handler, which allows remote attackers to execute arbitrary code by manipulating the `wan-url` argument.</description><content:encoded><![CDATA[<p>CVE-2026-6194 describes a stack-based buffer overflow vulnerability present in Totolink A3002MU router firmware version B20211125.1046. The vulnerability resides within the HTTP Request Handler, specifically in the <code>sub_410188</code> function of the <code>/boafrm/formWlanSetup</code> file. A remote attacker can exploit this vulnerability by crafting a malicious HTTP request that manipulates the <code>wan-url</code> argument, leading to arbitrary code execution on the device. Publicly available exploit code increases the likelihood of exploitation. Successful exploitation allows an attacker to compromise the device and potentially gain control of the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A3002MU router running firmware B20211125.1046.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/boafrm/formWlanSetup</code> endpoint.</li>
<li>The crafted request includes a <code>wan-url</code> argument with a payload exceeding the buffer size allocated for it in the <code>sub_410188</code> function.</li>
<li>The HTTP Request Handler processes the request and calls the vulnerable <code>sub_410188</code> function.</li>
<li>Due to insufficient bounds checking, the oversized <code>wan-url</code> argument overflows the stack buffer.</li>
<li>The attacker overwrites critical data on the stack, including the return address.</li>
<li>Upon returning from the <code>sub_410188</code> function, execution is redirected to an attacker-controlled address.</li>
<li>The attacker executes arbitrary code, potentially gaining full control of the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6194 can lead to complete compromise of the affected Totolink A3002MU router. This allows attackers to eavesdrop on network traffic, modify DNS settings, inject malicious code into web pages served to connected clients, or use the compromised router as a botnet node. Given the widespread use of these routers, a large number of devices could be at risk, potentially impacting home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/boafrm/formWlanSetup</code> with unusually long <code>wan-url</code> parameters to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Suspicious WAN-URL Parameter Length&rdquo;).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect and alert on potential exploitation attempts.</li>
<li>If possible, block requests matching the patterns identified in the Sigma rules at your network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6194</category><category>buffer-overflow</category><category>totolink</category><category>router</category></item><item><title>TOTOLINK A7000R Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-buffer-overflow/</link><pubDate>Mon, 13 Apr 2026 07:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6168) exists in TOTOLINK A7000R devices up to version 9.1.0u.6115, allowing remote attackers to execute arbitrary code via a crafted ssid5g argument to the setWiFiEasyGuestCfg function in /cgi-bin/cstecgi.cgi.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, tracked as CVE-2026-6168, has been identified in TOTOLINK A7000R routers with firmware versions up to 9.1.0u.6115. The vulnerability resides within the <code>setWiFiEasyGuestCfg</code> function located in the <code>/cgi-bin/cstecgi.cgi</code> file. Successful exploitation allows a remote attacker to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. Given the widespread use of TOTOLINK devices, this vulnerability poses a significant threat to home and small business networks. Exploitation is possible with low privileges, as it only requires authentication to the device&rsquo;s web interface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the TOTOLINK A7000R web interface. This step assumes default credentials or compromised credentials.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The request includes the <code>setWiFiEasyGuestCfg</code> function call.</li>
<li>The <code>ssid5g</code> argument within the POST request is populated with a string exceeding the buffer&rsquo;s capacity.</li>
<li>The vulnerable <code>setWiFiEasyGuestCfg</code> function in <code>/cgi-bin/cstecgi.cgi</code> processes the oversized <code>ssid5g</code> argument without proper bounds checking.</li>
<li>This leads to a stack-based buffer overflow, overwriting adjacent memory regions.</li>
<li>The attacker leverages the overflow to inject and execute arbitrary code on the device.</li>
<li>Successful code execution can grant the attacker full control of the router, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6168 allows a remote attacker to execute arbitrary code on the vulnerable TOTOLINK A7000R device. This can lead to complete compromise of the router, including the ability to intercept network traffic, modify DNS settings, inject malicious scripts into websites, and use the router as a pivot point for further attacks within the network. This vulnerability affects potentially thousands of devices, particularly in home and small business environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply firmware updates immediately if TOTOLINK releases a patch for CVE-2026-6168.</li>
<li>Monitor web server logs for POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusually long <code>ssid5g</code> parameters, using the provided Sigma rule.</li>
<li>Implement network intrusion detection systems (IDS) rules to detect attempts to exploit stack-based buffer overflows targeting TOTOLINK devices.</li>
<li>Restrict access to the router&rsquo;s web interface to trusted IP addresses, if possible.</li>
<li>Enforce strong and unique passwords for all router accounts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>totolink</category><category>buffer-overflow</category><category>cve-2026-6168</category><category>router</category></item><item><title>Samsung Escargot Out-of-Bounds Write Vulnerability (CVE-2026-25207)</title><link>https://feed.craftedsignal.io/briefs/2026-04-samsung-escargot-overflow/</link><pubDate>Mon, 13 Apr 2026 05:17:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-samsung-escargot-overflow/</guid><description>CVE-2026-25207 is an out-of-bounds write vulnerability in Samsung Open Source Escargot that allows for buffer overflows, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-25207 is an out-of-bounds write vulnerability affecting Samsung Open Source Escargot, specifically version 97e8115ab1110bc502b4b5e4a0c689a71520d335. This flaw allows attackers to potentially overwrite memory buffers, leading to denial of service or arbitrary code execution. The vulnerability arises due to insufficient bounds checking when handling specific data inputs within the Escargot software. Successful exploitation of this vulnerability could grant an attacker elevated privileges or control over the affected system. The severity of the vulnerability is rated as HIGH with a CVSS score of 7.4, indicating a significant risk to systems running vulnerable versions of Escargot.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input designed to trigger the out-of-bounds write.</li>
<li>The malicious input is sent to the vulnerable Escargot application. This could involve exploiting a network service that relies on Escargot for data processing.</li>
<li>Escargot processes the malicious input without proper bounds checking.</li>
<li>The lack of bounds checking allows the input to write data beyond the allocated buffer.</li>
<li>The out-of-bounds write overwrites adjacent memory regions, potentially corrupting program data or code.</li>
<li>The memory corruption leads to a crash or allows the attacker to overwrite critical function pointers.</li>
<li>If function pointers are successfully overwritten, the attacker gains control of program execution.</li>
<li>The attacker can execute arbitrary code with the privileges of the Escargot process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-25207 can lead to arbitrary code execution with the privileges of the Escargot process. This can result in complete system compromise, data loss, or denial of service. Given the potential for remote code execution, this vulnerability poses a significant risk to systems utilizing the vulnerable Escargot version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided in the associated GitHub pull request to remediate the vulnerability. (<a href="https://github.com/Samsung/escargot/pull/1554">https://github.com/Samsung/escargot/pull/1554</a>)</li>
<li>Monitor systems for unexpected crashes or memory corruption events related to the Escargot process.</li>
<li>Implement input validation and sanitization measures to prevent malicious inputs from reaching the vulnerable code.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-25207</category><category>out-of-bounds write</category><category>buffer overflow</category><category>samsung</category><category>escargot</category></item><item><title>Totolink A800R Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-a800r-buffer-overflow/</link><pubDate>Mon, 13 Apr 2026 04:26:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-a800r-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the Totolink A800R router version 4.1.2cu.5137_B20200730, allowing unauthenticated attackers to potentially execute arbitrary code by overflowing the apcliSsid argument in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-6157, has been discovered in Totolink A800R routers running firmware version 4.1.2cu.5137_B20200730. The vulnerability resides within the <code>setAppEasyWizardConfig</code> function in the <code>/lib/cste_modules/app.so</code> library. Successful exploitation allows remote attackers to potentially execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers are often the perimeter defense for networks making them lucrative targets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A800R router with firmware version 4.1.2cu.5137_B20200730 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>setAppEasyWizardConfig</code> function.</li>
<li>The malicious request includes an overly long string as the value for the <code>apcliSsid</code> argument.</li>
<li>The router receives the HTTP request and passes the <code>apcliSsid</code> argument to the <code>setAppEasyWizardConfig</code> function.</li>
<li>The <code>setAppEasyWizardConfig</code> function copies the contents of <code>apcliSsid</code> into a fixed-size buffer without proper bounds checking.</li>
<li>The overly long <code>apcliSsid</code> string overflows the buffer, overwriting adjacent memory locations.</li>
<li>The attacker carefully crafts the overflowed data to overwrite the return address of the function.</li>
<li>When the function returns, control is transferred to the attacker&rsquo;s code, leading to arbitrary code execution. This could lead to the installation of malware or complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability grants the attacker the ability to execute arbitrary code on the affected Totolink A800R router. This can result in complete compromise of the device, enabling the attacker to intercept network traffic, modify router settings, or use the router as a launching point for further attacks within the network. Given the availability of public exploits, a large number of devices could be vulnerable, making this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Totolink to patch CVE-2026-6157.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting the <code>setAppEasyWizardConfig</code> function, as described in the attack chain. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>If updates are unavailable, consider replacing the vulnerable device.</li>
<li>Disable remote management access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6157</category><category>buffer-overflow</category><category>router</category><category>iot</category></item><item><title>Easy Video to iPod Converter 1.6.20 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-easy-video-overflow/</link><pubDate>Sun, 12 Apr 2026 13:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-easy-video-overflow/</guid><description>Easy Video to iPod Converter 1.6.20 is vulnerable to a local buffer overflow in the user registration field, allowing a local attacker to overwrite the structured exception handler (SEH) by providing a crafted payload exceeding 996 bytes in the username field, potentially leading to arbitrary code execution with user privileges.</description><content:encoded><![CDATA[<p>Easy Video to iPod Converter version 1.6.20 is susceptible to a local buffer overflow vulnerability (CVE-2019-25701) within the user registration functionality. This vulnerability allows an attacker with local access to the system to potentially overwrite the Structured Exception Handler (SEH) by providing a crafted payload larger than 996 bytes in the username field during registration. This could lead to arbitrary code execution within the context of the user running the vulnerable application. Successful exploitation requires a local attacker with the ability to interact with the Easy Video to iPod Converter software. This vulnerability was published on 2026-04-12 and poses a significant risk because it allows for local privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Easy Video to iPod Converter 1.6.20 installed.</li>
<li>The attacker launches the Easy Video to iPod Converter application.</li>
<li>The attacker navigates to the user registration field within the application.</li>
<li>The attacker inputs a specially crafted payload exceeding 996 bytes into the username registration field.</li>
<li>Due to the buffer overflow vulnerability, the payload overwrites the Structured Exception Handler (SEH).</li>
<li>The application attempts to handle an exception, triggering the overwritten SEH.</li>
<li>Control is transferred to the attacker&rsquo;s payload within the overwritten SEH.</li>
<li>The attacker executes arbitrary code with the privileges of the user running the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25701 allows a local attacker to execute arbitrary code on the targeted system. This could lead to privilege escalation, allowing the attacker to gain elevated access and control over the system. The impact includes potential data theft, system compromise, and further malicious activities initiated from the compromised host. The severity is high due to the potential for full system compromise, and the vulnerability is exploitable locally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for suspicious processes spawned from the Easy Video to iPod Converter executable, as this may indicate successful exploitation (see rule: &ldquo;Suspicious Process Creation from Easy Video to iPod Converter&rdquo;).</li>
<li>Monitor for registry modifications performed by the Easy Video to iPod Converter process, as some exploitation techniques might involve persistence mechanisms via registry keys (see rule: &ldquo;Registry Modification by Easy Video to iPod Converter&rdquo;).</li>
<li>Consider upgrading or removing the vulnerable application if a patch is not available to mitigate CVE-2019-25701.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25701</category><category>buffer-overflow</category><category>local-privilege-escalation</category><category>windows</category></item><item><title>RGui 3.5.0 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-rgui-buffer-overflow/</link><pubDate>Sun, 12 Apr 2026 13:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rgui-buffer-overflow/</guid><description>RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>RGui 3.5.0, a component of the R programming language distribution for Windows, is vulnerable to a local buffer overflow in its GUI preferences dialog. This vulnerability, identified as CVE-2018-25258, allows an attacker with local access to bypass Data Execution Prevention (DEP) and execute arbitrary code. The attack involves crafting malicious input to the &ldquo;Language for menus and messages&rdquo; field within the GUI preferences, triggering a stack-based buffer overflow. This overflow overwrites the Structured Exception Handler (SEH) record, enabling the attacker to redirect execution flow and execute a Return-Oriented Programming (ROP) chain. The ROP chain is then used to allocate memory using VirtualAlloc and ultimately execute arbitrary code. This vulnerability impacts systems running the affected version of RGui.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a Windows system running RGui 3.5.0.</li>
<li>The attacker opens the GUI preferences dialog within RGui.</li>
<li>The attacker inputs a specially crafted string into the &ldquo;Language for menus and messages&rdquo; field. This string is designed to overflow the buffer on the stack.</li>
<li>The buffer overflow overwrites the SEH record, replacing the legitimate handler address with the address of a ROP chain.</li>
<li>An exception occurs due to the overflow, triggering the SEH.</li>
<li>Instead of the legitimate exception handler, the attacker&rsquo;s ROP chain is executed.</li>
<li>The ROP chain calls VirtualAlloc to allocate a region of memory with execute permissions.</li>
<li>The attacker copies malicious code into the newly allocated memory and transfers control to it, achieving arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code with the privileges of the user running RGui. This could lead to the installation of malware, data theft, or complete system compromise. While the vulnerability requires local access, it represents a significant risk to systems where untrusted users have access to RGui. The vulnerability affects RGui version 3.5.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a later version of RGui that addresses the CVE-2018-25258 vulnerability if available.</li>
<li>Monitor process creations for <code>rgui.exe</code> spawning unusual child processes or making unexpected network connections, using a process creation log source.</li>
<li>Implement application whitelisting to prevent the execution of unauthorized programs.</li>
<li>Deploy the Sigma rule for detecting potential ROP chain execution to identify exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>dep-bypass</category><category>rgui</category><category>cve-2018-25258</category><category>windows</category></item><item><title>HTML5 Video Player 1.2.5 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-html5-video-player-buffer-overflow/</link><pubDate>Sun, 12 Apr 2026 13:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-html5-video-player-buffer-overflow/</guid><description>HTML5 Video Player version 1.2.5 is vulnerable to a local buffer overflow, allowing attackers to execute arbitrary code by providing an oversized key code string through the Help Register dialog.</description><content:encoded><![CDATA[<p>HTML5 Video Player version 1.2.5 is susceptible to a local buffer overflow vulnerability (CVE-2019-25689). An attacker can exploit this flaw by crafting a malicious payload exceeding 997 bytes and pasting it into the &ldquo;KEY CODE&rdquo; field located within the Help Register dialog. Successful exploitation leads to arbitrary code execution within the context of the application, as demonstrated by spawning a calculator process. This vulnerability, discovered in 2019 but only recently published, highlights the importance of keeping software up to date and being cautious about user-supplied input, even in seemingly benign interfaces. The vulnerability has a CVSS v3.1 score of 8.4, indicating a high severity due to the potential for complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of HTML5 Video Player 1.2.5.</li>
<li>Attacker opens the Help Register dialog within the HTML5 Video Player.</li>
<li>Attacker prepares a malicious payload exceeding 997 bytes, designed to overwrite the buffer.</li>
<li>Attacker copies the crafted payload into the &ldquo;KEY CODE&rdquo; field within the Help Register dialog.</li>
<li>The application attempts to process the oversized key code, triggering the buffer overflow.</li>
<li>The overflow overwrites adjacent memory, including the instruction pointer.</li>
<li>The instruction pointer is redirected to attacker-controlled code within the payload.</li>
<li>The attacker-controlled code executes, spawning a calculator process as proof of concept, but can be any arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability grants the attacker the ability to execute arbitrary code within the context of the affected HTML5 Video Player process. While the proof-of-concept exploit spawns a calculator, attackers could leverage this vulnerability to install malware, steal sensitive data, or pivot to other systems on the network. Due to the local nature of the attack, the impact is limited to systems where the vulnerable software is installed and the attacker has local access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Although no patch is available, consider uninstalling HTML5 Video Player 1.2.5 or restricting access to systems where it is installed to mitigate the risk of CVE-2019-25689.</li>
<li>Monitor process creations for suspicious child processes spawned from the HTML5 Video Player executable using the <code>Suspicious Child Process of HTML5 Video Player</code> Sigma rule.</li>
<li>Implement application whitelisting to prevent the execution of unauthorized code, which can help to mitigate the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>html5-video-player</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</link><pubDate>Sun, 12 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</guid><description>A remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda F451 router firmware version 1.0.0.7. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> component&rsquo;s httpd service. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious <code>page</code> argument. This can lead to arbitrary code execution on the device. Given the public availability of the exploit (CVE-2026-6120), Tenda F451 routers are at immediate risk of compromise if not properly secured. This vulnerability poses a significant threat due to the widespread use of Tenda routers in home and small office environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router running vulnerable firmware version 1.0.0.7.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a string exceeding the buffer size allocated for it in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service on the router receives the malicious request and passes the <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromDhcpListClient</code> function attempts to copy the oversized <code>page</code> argument into a fixed-size buffer on the stack, causing a buffer overflow.</li>
<li>The overflow overwrites adjacent stack memory, including the return address of the function.</li>
<li>The attacker controls the overwritten return address, redirecting execution to attacker-controlled code or a ROP chain.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise and network access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda F451 router. This allows attackers to control the device, intercept network traffic, change DNS settings, inject malicious scripts into web pages served to connected devices, or use the router as a pivot point for further attacks within the network. This vulnerability affects all users of the Tenda F451 router running firmware version 1.0.0.7, potentially impacting thousands of devices globally. Given the high CVSS score of 8.8, the risk is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>/goform/DhcpListClient</code> endpoint, especially those with unusually long <code>page</code> parameters (refer to the rule <code>Tenda F451 Suspicious URI Length</code>).</li>
<li>Inspect network traffic for abnormal patterns related to compromised routers (unusual DNS requests, connections to known malicious IPs).</li>
<li>Implement rate limiting and input validation on web server endpoints where possible to mitigate buffer overflow attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-6120, although patches may not be available.</li>
<li>Consider deploying network intrusion detection systems (NIDS) to identify and block exploitation attempts (refer to the <code>Tenda F451 Buffer Overflow Attempt</code> rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-6120</category><category>iot</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-overflow/</guid><description>Tenda F451 router version 1.0.0.7 is vulnerable to a stack-based buffer overflow in the frmL7ProtForm function, enabling remote attackers to execute arbitrary code by manipulating the 'page' argument.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>frmL7ProtForm</code> function of the <code>/goform/L7Prot</code> component, specifically within the <code>httpd</code> service. A remote attacker can exploit this flaw by crafting a malicious request targeting the <code>page</code> argument. Successful exploitation allows the attacker to execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected devices, potentially leading to full device compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda F451 router running firmware version 1.0.0.7.</li>
<li>Attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/L7Prot</code> endpoint.</li>
<li>The malicious request includes the <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>frmL7ProtForm</code> function.</li>
<li>The <code>httpd</code> service processes the request without proper bounds checking on the <code>page</code> argument.</li>
<li>The oversized payload overflows the stack buffer during the execution of the <code>frmL7ProtForm</code> function.</li>
<li>The buffer overflow overwrites adjacent memory regions on the stack, including the return address.</li>
<li>The attacker-controlled return address redirects execution to attacker-supplied code or a return-oriented programming (ROP) chain.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda F451 router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the device as a bot in a botnet. Given the availability of public exploits, vulnerable devices are at high risk of compromise. The number of potentially affected devices is substantial, as the Tenda F451 is a widely used router model.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/L7Prot</code> with unusually long <code>page</code> parameters, deploying the Sigma rule <code>Detect Tenda F451 Buffer Overflow Attempt</code> to identify potential exploitation attempts.</li>
<li>Since no patch is available, consider replacing the Tenda F451 1.0.0.7 with a more secure router or firewall solution.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other network devices.</li>
<li>Disable remote administration access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6122</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F451 Stack-Based Buffer Overflow Vulnerability (CVE-2026-6121)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</link><pubDate>Sun, 12 Apr 2026 08:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-6121) exists in the WrlclientSet function of the /goform/WrlclientSet file in the httpd component of Tenda F451 version 1.0.0.7, allowing remote attackers to execute arbitrary code by manipulating the GO argument.</description><content:encoded><![CDATA[<p>CVE-2026-6121 is a stack-based buffer overflow vulnerability affecting Tenda F451 router version 1.0.0.7. The vulnerability resides within the <code>WrlclientSet</code> function located in the <code>/goform/WrlclientSet</code> file of the <code>httpd</code> component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected router, specifically manipulating the <code>GO</code> argument. Due to insufficient bounds checking on the <code>GO</code> argument&rsquo;s size when passed to the <code>WrlclientSet</code> function, an attacker can write beyond the allocated buffer on the stack, potentially leading to arbitrary code execution. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers that are accessible from the internet are at highest risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router version 1.0.0.7 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlclientSet</code> endpoint.</li>
<li>Within the HTTP POST request, the attacker includes the <code>GO</code> argument, filling it with a payload exceeding the buffer size allocated for it within the <code>WrlclientSet</code> function.</li>
<li>The <code>httpd</code> component of the Tenda F451 router receives the HTTP request and passes the <code>GO</code> argument to the vulnerable <code>WrlclientSet</code> function.</li>
<li>Due to the buffer overflow, the attacker&rsquo;s payload overwrites adjacent memory locations on the stack.</li>
<li>The attacker&rsquo;s payload overwrites the return address on the stack, redirecting execution flow to attacker-controlled code.</li>
<li>The attacker-controlled code executes with the privileges of the <code>httpd</code> process, allowing the attacker to perform actions such as modifying router configuration, executing system commands, or establishing a reverse shell.</li>
<li>The attacker gains persistent access to the router and potentially the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6121 can lead to complete compromise of the affected Tenda F451 router. An attacker can gain unauthorized access to the device&rsquo;s configuration, potentially modifying DNS settings, firewall rules, or other critical parameters. This can lead to redirection of user traffic, denial-of-service attacks, or the establishment of a foothold within the targeted network for further malicious activities. Given the ease of exploitation due to the publicly available exploit code, a large number of Tenda F451 routers could be compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlclientSet</code> with abnormally long <code>GO</code> parameter values to detect potential exploitation attempts (see Sigma rule below and enable webserver logging).</li>
<li>Implement rate limiting for requests to the <code>/goform/WrlclientSet</code> endpoint to mitigate potential brute-force exploitation attempts (configure your firewall or WAF).</li>
<li>Upgrade to a patched firmware version when available or replace the affected devices, if the vendor does not provide a fix.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6121</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)</title><link>https://feed.craftedsignal.io/briefs/2026-04-osslsigncode-overflow/</link><pubDate>Thu, 09 Apr 2026 16:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-osslsigncode-overflow/</guid><description>A stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack buffer overflow vulnerability has been identified in osslsigncode, a tool used for Authenticode signing and timestamping. Specifically, versions prior to 2.12 are susceptible to CVE-2026-39853. The vulnerability occurs during the verification of PKCS#7 signatures in PE, MSI, CAB, and script files. The code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (64 bytes) without proper length validation. This allows an attacker to craft a malicious signed file containing an oversized digest field within the SpcIndirectDataContent structure. When a user attempts to verify this malicious file using a vulnerable version of osslsigncode, the resulting unbounded memcpy operation overflows the stack buffer, potentially corrupting adjacent stack state and leading to arbitrary code execution. This vulnerability has been addressed in osslsigncode version 2.12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious signed file (PE, MSI, CAB, or script) with an oversized digest field within the SpcIndirectDataContent structure of the PKCS#7 signature.</li>
<li>The malicious file is distributed to a target user or system.</li>
<li>The target system uses a vulnerable version of osslsigncode (prior to 2.12) to verify the signature of the malicious file using the command <code>osslsigncode verify</code>.</li>
<li>During the signature verification process, osslsigncode parses the SpcIndirectDataContent structure.</li>
<li>The vulnerable code attempts to copy the digest value from the parsed SpcIndirectDataContent into a fixed-size stack buffer (64 bytes) without proper length validation.</li>
<li>Due to the oversized digest field, the <code>memcpy</code> operation overflows the stack buffer.</li>
<li>The stack buffer overflow corrupts adjacent stack state, potentially overwriting return addresses or other critical data.</li>
<li>The corrupted stack state leads to arbitrary code execution under the context of the osslsigncode process, granting the attacker control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39853 allows an attacker to execute arbitrary code on a system running a vulnerable version of osslsigncode. This can lead to complete system compromise, data exfiltration, or further malicious activities. While the specific number of affected systems is unknown, any system using osslsigncode for signature verification prior to version 2.12 is potentially vulnerable. The impact is significant, as it can undermine the trust placed in Authenticode signatures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade osslsigncode to version 2.12 or later to patch CVE-2026-39853 and prevent stack buffer overflows.</li>
<li>Monitor systems for unexpected crashes or unusual behavior associated with osslsigncode, which could indicate exploitation attempts.</li>
<li>Implement input validation and sanitization on digest lengths during signature verification to prevent similar vulnerabilities in other applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>osslsigncode</category><category>buffer-overflow</category><category>authenticode</category><category>code-signing</category><category>CVE-2026-39853</category></item><item><title>Tenda AC15 Router Stack-Based Buffer Overflow (CVE-2026-5830)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ac15-overflow/</link><pubDate>Thu, 09 Apr 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ac15-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5830) in Tenda AC15 firmware version 15.03.05.18 allows remote attackers to execute arbitrary code by manipulating password change parameters, potentially leading to complete device compromise.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, tracked as CVE-2026-5830, has been identified in Tenda AC15 routers running firmware version 15.03.05.18. The vulnerability resides in the <code>websGetVar</code> function within the <code>/goform/SysToolChangePwd</code> file, which handles password change requests. By crafting malicious requests and manipulating the <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> arguments, an attacker can overwrite the stack, potentially leading to arbitrary code execution. The vulnerability is remotely exploitable by an authenticated user, and publicly available exploit code exists, increasing the risk of widespread exploitation. This poses a significant threat to home and small business networks using affected Tenda AC15 routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to the router&rsquo;s web management interface, potentially through weak credentials or brute-forcing.</li>
<li>The attacker crafts a malicious HTTP POST request to <code>/goform/SysToolChangePwd</code>.</li>
<li>The crafted request includes oversized data within the <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> parameters.</li>
<li>The <code>websGetVar</code> function processes the request without proper bounds checking.</li>
<li>The oversized data overflows the stack buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address on the stack.</li>
<li>The <code>websGetVar</code> function returns, diverting execution to the attacker-controlled address.</li>
<li>The attacker-controlled address contains shellcode that executes arbitrary commands, potentially granting complete control over the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda AC15 router. This could lead to complete device compromise, including unauthorized access to network traffic, modification of router settings, installation of malware, and use of the compromised device as a botnet node. Given the potentially widespread use of Tenda AC15 routers in home and small business environments, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tenda to remediate CVE-2026-5830 as soon as they become available.</li>
<li>Monitor webserver logs for suspicious POST requests to <code>/goform/SysToolChangePwd</code> with unusually long <code>oldPwd</code>, <code>newPwd</code>, or <code>cfmPwd</code> parameters and deploy the Sigma rule <code>Detect Tenda AC15 Password Change Overflow</code>.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to the router&rsquo;s web management interface.</li>
<li>Restrict access to the router&rsquo;s web management interface to trusted networks only by configuring firewall rules.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5830</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>stack-overflow</category></item><item><title>ASDA-Soft Stack-based Buffer Overflow Vulnerability (CVE-2026-5726)</title><link>https://feed.craftedsignal.io/briefs/2026-04-asda-soft-overflow/</link><pubDate>Wed, 08 Apr 2026 03:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-asda-soft-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in ASDA-Soft, potentially leading to arbitrary code execution, as identified by CVE-2026-5726 and reported by Deltaww with a CVSS v3.1 score of 7.8.</description><content:encoded><![CDATA[<p>CVE-2026-5726 describes a stack-based buffer overflow vulnerability in ASDA-Soft, a software product by Deltaww. This vulnerability, reported and assigned a CVSS v3.1 score of 7.8 by Deltaww, could allow an attacker to execute arbitrary code on a system running the affected software. Successful exploitation requires user interaction, as indicated by the CVSS vector. The specific version of ASDA-Soft affected is detailed in Deltaww&rsquo;s advisory Delta-PCSA-2026-00007. This vulnerability poses a significant risk to organizations using the affected software, as it could lead to data breaches, system compromise, and other malicious activities. Defenders should apply the provided mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable version of ASDA-Soft running on a target system.</li>
<li>The attacker crafts a malicious input designed to trigger the stack-based buffer overflow. This input likely targets a specific function or data structure within ASDA-Soft.</li>
<li>The attacker delivers the malicious input to the vulnerable ASDA-Soft application, potentially through a specially crafted file or network request requiring user interaction (e.g., opening a malicious project file).</li>
<li>When ASDA-Soft processes the malicious input, the buffer overflow occurs, overwriting adjacent memory on the stack.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow to attacker-controlled code.</li>
<li>The attacker-controlled code is executed with the privileges of the ASDA-Soft process.</li>
<li>The attacker gains control of the system, potentially installing malware, exfiltrating data, or performing other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5726 allows for arbitrary code execution on the affected system. Given a CVSS score of 7.8, the impact is considered high. While the number of affected systems is currently unknown, organizations using ASDA-Soft are at risk. A successful attack could lead to complete system compromise, data breaches, and disruption of services. The vulnerability requires user interaction, which limits the scope of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Download and review Deltaww&rsquo;s security advisory Delta-PCSA-2026-00007 for ASDA-Soft to understand the specific affected versions and recommended mitigations.</li>
<li>Monitor network traffic and process execution for suspicious activity related to ASDA-Soft, using the provided Sigma rule for detecting unusual ASDA-Soft processes.</li>
<li>Apply any available patches or updates for ASDA-Soft to remediate CVE-2026-5726.</li>
<li>Implement user awareness training to educate users about the risks of opening untrusted files or clicking on suspicious links that could lead to exploitation of vulnerabilities like CVE-2026-5726.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>asda-soft</category><category>cve-2026-5726</category></item><item><title>Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 22:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-cx12l-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda CX12L routers running firmware version 16.03.53.12. The vulnerability resides within the <code>fromwebExcptypemanFilter</code> function in the <code>/goform/webExcptypemanFilter</code> file.  An attacker with local network access can exploit this flaw by manipulating the <code>page</code> argument passed to this function, leading to arbitrary code execution on the device. The vulnerability, identified as CVE-2026-5684, has a CVSS v3.1 score of 8.0, indicating a high severity. Public exploits for this vulnerability are available, making it crucial for network administrators to address this issue promptly. Successful exploitation could allow an attacker to gain complete control of the router, potentially leading to data theft, network compromise, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the local network where the Tenda CX12L router is located.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/webExcptypemanFilter</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a payload exceeding the buffer size allocated for it within the <code>fromwebExcptypemanFilter</code> function.</li>
<li>The router processes the HTTP request and passes the overly long <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromwebExcptypemanFilter</code> function attempts to write the contents of the <code>page</code> argument into a fixed-size buffer on the stack.</li>
<li>Due to the excessive length of the <code>page</code> argument, the buffer overflows, overwriting adjacent memory regions on the stack.</li>
<li>The attacker leverages the buffer overflow to overwrite the return address on the stack with the address of malicious code or a ROP chain.</li>
<li>When the <code>fromwebExcptypemanFilter</code> function returns, control is transferred to the attacker-controlled code, allowing for arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5684 allows an attacker with local network access to gain complete control of the affected Tenda CX12L router. This can lead to a variety of malicious activities, including unauthorized access to network traffic, modification of router settings, deployment of malicious firmware, and use of the compromised router as a botnet node. Given the availability of public exploits, organizations using this router model are at significant risk. The number of potential victims is dependent on the number of unpatched Tenda CX12L devices deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor webserver logs for HTTP requests targeting the <code>/goform/webExcptypemanFilter</code> endpoint with abnormally long <code>page</code> parameters to detect potential exploitation attempts. (Log Source: webserver, Rule: &ldquo;Detect Tenda CX12L Web Request with Long Page Parameter&rdquo;)</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CX12L Stack Buffer Overflow Attempt&rdquo; to identify suspicious process creations following a potential exploit.</li>
<li>Review and restrict local network access to the Tenda CX12L router to reduce the attack surface, as the exploit requires local network access.</li>
<li>Contact Tenda for a security patch or firmware update to address CVE-2026-5684.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-5684</category></item><item><title>Qualcomm Memory Corruption Vulnerability CVE-2026-21382</title><link>https://feed.craftedsignal.io/briefs/2026-04-qualcomm-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 16:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qualcomm-buffer-overflow/</guid><description>CVE-2026-21382 is a memory corruption vulnerability related to handling power management requests with improperly sized input/output buffers, potentially leading to code execution.</description><content:encoded><![CDATA[<p>CVE-2026-21382 describes a memory corruption vulnerability in Qualcomm products. The vulnerability stems from improper handling of power management requests with inadequately sized input/output buffers, which could lead to a buffer overflow (CWE-120). This vulnerability was reported by Qualcomm, Inc., and assigned a CVSS v3.1 score of 7.8. While the specific affected products are not detailed in the provided source, the advisory indicates it is part of the April 2026 Qualcomm security bulletin. Successful exploitation could lead to arbitrary code execution within the context of the affected power management component. Defenders should monitor for unusual activity related to power management processes and prioritize patching when updates become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a vulnerable Qualcomm device.</li>
<li>The attacker crafts a malicious power management request with an oversized input buffer.</li>
<li>The crafted request is sent to the affected power management component.</li>
<li>The component processes the request without properly validating the buffer size.</li>
<li>Data from the oversized input buffer overflows into adjacent memory regions.</li>
<li>The attacker overwrites critical data structures or executable code within memory.</li>
<li>The system attempts to execute the corrupted code, leading to a crash or arbitrary code execution.</li>
<li>The attacker gains control of the device or escalates privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-21382 could allow an attacker to execute arbitrary code on a vulnerable Qualcomm device. Although the number of affected devices and specific sectors are not specified in the provided source, the impact of successful exploitation includes potential device compromise, data theft, or denial of service. Due to the high CVSS score, unpatched systems are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for power management-related processes spawning unexpected child processes, using a rule similar to the example below.</li>
<li>Analyze network connections from power management-related processes for suspicious outbound traffic to unusual ports or IPs.</li>
<li>Investigate any crashes or unexpected reboots on Qualcomm-based devices, correlating them with power management events in system logs.</li>
<li>Monitor for registry modifications made by power management processes, specifically those related to loading custom drivers or libraries.</li>
<li>Review and apply the security updates outlined in the Qualcomm security bulletin for April 2026 to patch CVE-2026-21382 (<a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html">https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html</a>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-21382</category><category>buffer-overflow</category><category>memory-corruption</category><category>qualcomm</category></item><item><title>CVE-2025-47389 Memory Corruption Vulnerability in Attestation Report Generation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2025-47389/</link><pubDate>Mon, 06 Apr 2026 16:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2025-47389/</guid><description>CVE-2025-47389 describes a memory corruption vulnerability stemming from a buffer copy operation failure due to an integer overflow during the attestation report generation process, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2025-47389 details a memory corruption vulnerability affecting attestation report generation. The flaw arises from a buffer copy operation that fails due to an integer overflow. This overflow occurs during the process of calculating the buffer size required for the attestation report, potentially leading to a write beyond the allocated buffer. Successful exploitation could allow an attacker to overwrite adjacent memory regions, potentially leading to arbitrary code execution or a denial-of-service condition. The vulnerability has a CVSS v3.1 base score of 7.8, indicating a high severity. The vulnerability was reported by Qualcomm and affects Qualcomm products that use attestation report generation. Defenders should monitor for unexpected memory access violations related to attestation services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts input to trigger attestation report generation.</li>
<li>The system initiates an attestation report generation process.</li>
<li>An integer overflow occurs during the buffer size calculation for the report.</li>
<li>A buffer is allocated based on the incorrect, smaller size resulting from the overflow.</li>
<li>Data is copied into the undersized buffer during the attestation report creation.</li>
<li>The buffer copy operation overwrites memory beyond the allocated buffer&rsquo;s boundaries.</li>
<li>Corrupted memory leads to a crash or potentially allows for arbitrary code execution.</li>
<li>Attacker gains control of the system or causes a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-47389 can lead to memory corruption, potentially enabling arbitrary code execution. This can result in a complete compromise of the affected system, data breaches, or a denial-of-service condition. While the specific number of affected devices is unknown, the vulnerability impacts any device using the affected Qualcomm component for attestation. Exploitation is local, requiring privileged access, but the impact is critical due to potential code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process memory for write operations exceeding allocated buffer sizes, specifically around attestation report generation (see Sigma rule &ldquo;Detect Memory Corruption via Buffer Overflow&rdquo;).</li>
<li>Investigate any crashes or unexpected behavior associated with attestation services, as these could be indicators of exploitation attempts.</li>
<li>Apply patches or updates provided by Qualcomm to address CVE-2025-47389 as soon as they become available (reference: <a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html)">https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html)</a>.</li>
<li>Monitor for any anomalous behavior originating from processes involved in attestation report generation (see Sigma rule &ldquo;Detect Anomalous Attestation Process&rdquo;).</li>
<li>Review and harden access controls to limit the potential impact of local exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2025-47389</category><category>memory-corruption</category><category>buffer-overflow</category><category>attestation</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5605, affects Tenda CH22 router version 1.0.0.1. This flaw resides in the <code>formWrlExtraSet</code> function within the <code>/goform/WrlExtraSet</code> file. A remote, unauthenticated attacker can exploit a stack-based buffer overflow by sending a crafted HTTP request with a malicious value for the <code>GO</code> argument. Publicly available exploits exist, increasing the risk of widespread exploitation. Successful exploitation allows the attacker to potentially execute arbitrary code on the device, leading to a complete compromise of the router and the network it serves.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/WrlExtraSet</code> endpoint.</li>
<li>The crafted request includes the <code>GO</code> argument with a string exceeding the expected buffer size in the <code>formWrlExtraSet</code> function.</li>
<li>The router&rsquo;s web server receives the request and passes the <code>GO</code> argument to the vulnerable function.</li>
<li>The <code>formWrlExtraSet</code> function attempts to copy the oversized <code>GO</code> argument into a fixed-size buffer on the stack.</li>
<li>This write operation overflows the buffer, overwriting adjacent memory regions, including the return address.</li>
<li>When the <code>formWrlExtraSet</code> function returns, it jumps to the address overwritten by the attacker.</li>
<li>The attacker&rsquo;s injected code executes with the privileges of the web server process, potentially allowing full control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5605 can lead to complete compromise of the Tenda CH22 router. This includes unauthorized access to network traffic, modification of router settings, and the potential for the router to be used as a pivot point for further attacks within the network. Given the ease of exploitation and the public availability of exploits, a large number of devices are potentially at risk, impacting both home and small business users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/WrlExtraSet</code> with unusually long <code>GO</code> parameter values to detect potential exploitation attempts. Use the Sigma rule provided below.</li>
<li>Implement rate limiting on requests to <code>/goform/WrlExtraSet</code> to mitigate brute-force exploitation attempts.</li>
<li>Since there is no patch available, consider replacing affected Tenda CH22 1.0.0.1 routers with devices from vendors with timely security updates.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5605</category><category>buffer-overflow</category><category>tenda</category></item><item><title>Belkin F9K1015 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5612)</title><link>https://feed.craftedsignal.io/briefs/2026-04-belkin-overflow/</link><pubDate>Mon, 06 Apr 2026 03:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-belkin-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5612) exists in Belkin F9K1015 1.00.10, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWlEncrypt' function of the '/goform/formWlEncrypt' file.</description><content:encoded><![CDATA[<p>CVE-2026-5612 is a critical vulnerability affecting Belkin F9K1015 router firmware version 1.00.10. Specifically, a stack-based buffer overflow can be triggered in the <code>formWlEncrypt</code> function located within the <code>/goform/formWlEncrypt</code> file. This vulnerability allows a remote attacker to inject arbitrary code by sending a specially crafted request to the router, manipulating the <code>webpage</code> argument. This exploit has been publicly disclosed, increasing the risk of widespread exploitation. Successful exploitation grants the attacker complete control over the device. The vendor was notified, but no response has been received. Given the ease of remote exploitation and the availability of exploit code, immediate action is required to mitigate the risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Belkin F9K1015 router running firmware version 1.00.10.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/formWlEncrypt</code> endpoint.</li>
<li>The crafted request includes an overly long string in the <code>webpage</code> argument to trigger the buffer overflow.</li>
<li>The router&rsquo;s webserver processes the request and calls the <code>formWlEncrypt</code> function.</li>
<li>The <code>formWlEncrypt</code> function copies the attacker-controlled <code>webpage</code> argument into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>The overflow overwrites adjacent memory regions on the stack, including the return address.</li>
<li>When the <code>formWlEncrypt</code> function returns, control is transferred to the attacker-controlled address.</li>
<li>The attacker executes arbitrary code, potentially gaining full control over the router and its network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5612 can lead to complete compromise of the Belkin F9K1015 router. An attacker can execute arbitrary code, potentially installing malware, intercepting network traffic, or using the router as a pivot point for further attacks within the network. Given that this vulnerability is remotely exploitable and a public exploit is available, any unpatched Belkin F9K1015 device is at high risk. The lack of vendor response increases the risk, placing responsibility on network defenders.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/formWlEncrypt</code> with abnormally long <code>webpage</code> parameters to detect potential exploitation attempts. See the provided Sigma rule for an example.</li>
<li>Implement network intrusion detection system (NIDS) rules to identify and block suspicious traffic targeting the <code>/goform/formWlEncrypt</code> endpoint.</li>
<li>Since a public exploit exists, consider blocking all traffic to the <code>/goform/formWlEncrypt</code> endpoint as a temporary mitigation measure until a patch is available.</li>
<li>Unfortunately, since the vendor is non-responsive, end-of-life (EOL) of these devices should be considered.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5612</category><category>buffer-overflow</category><category>belkin</category></item><item><title>Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-belkin-buffer-overflow/</link><pubDate>Mon, 06 Apr 2026 01:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-belkin-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5608) exists in the formWlanSetup function of Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the /goform/formWlanSetup file.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-5608, affects Belkin F9K1122 router version 1.00.33. The vulnerability resides within the <code>formWlanSetup</code> function of the <code>/goform/formWlanSetup</code> file. A remote attacker can exploit this vulnerability by manipulating the <code>webpage</code> argument, leading to arbitrary code execution on the device. This vulnerability is particularly critical because a public exploit is available, increasing the likelihood of widespread exploitation. The vendor has not responded to disclosure attempts, further compounding the risk. Successful exploitation could compromise the device&rsquo;s functionality and potentially allow the attacker to gain control of the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Belkin F9K1122 router running firmware version 1.00.33.</li>
<li>The attacker sends a crafted HTTP request to the <code>/goform/formWlanSetup</code> endpoint.</li>
<li>The HTTP request includes a malicious payload within the <code>webpage</code> argument, designed to overflow the stack buffer.</li>
<li>The <code>formWlanSetup</code> function processes the request without proper bounds checking on the <code>webpage</code> argument.</li>
<li>The overflow overwrites critical data on the stack, including the return address.</li>
<li>Upon function return, control is redirected to the attacker&rsquo;s injected code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the web server process.</li>
<li>The attacker gains control of the device and can execute arbitrary commands or modify router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5608 can lead to complete compromise of the affected Belkin F9K1122 router. An attacker could potentially gain unauthorized access to the network, intercept or modify network traffic, or use the compromised device as a point of entry for further attacks on other devices on the network. Given the availability of a public exploit, a large number of Belkin F9K1122 devices are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Belkin F9K1122 Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/formWlanSetup</code> with unusually long <code>webpage</code> arguments to identify potential exploitation attempts.</li>
<li>Since there is no patch available, network segmentation should be implemented to limit the impact of a compromised device, particularly for vulnerable Belkin F9K1122 routers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>belkin</category><category>cve-2026-5608</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</link><pubDate>Sun, 05 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.</description><content:encoded><![CDATA[<p>CVE-2026-5604 details a critical security vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability is a stack-based buffer overflow located in the <code>formCertLocalPrecreate</code> function within the <code>/goform/CertLocalPrecreate</code> file, which handles parameters. Attackers can exploit this flaw by manipulating the <code>standard</code> argument. The vulnerability can be triggered remotely, meaning an attacker does not need local access to the device. Given that a public exploit is available, this vulnerability poses a significant risk to users of the affected Tenda CH22 router. This allows unauthenticated attackers to potentially gain full control of the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda CH22 router version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/goform/CertLocalPrecreate</code> endpoint.</li>
<li>The attacker includes an overly long string as the value for the <code>standard</code> parameter in the HTTP request.</li>
<li>The Tenda CH22 router receives the malicious request and passes the <code>standard</code> parameter to the <code>formCertLocalPrecreate</code> function.</li>
<li>The <code>formCertLocalPrecreate</code> function copies the oversized <code>standard</code> argument into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>This causes a stack-based buffer overflow, overwriting adjacent memory regions, including the return address of the function.</li>
<li>The attacker controls the overwritten return address to point to attacker-controlled code injected into memory, or to a Return-Oriented Programming (ROP) chain.</li>
<li>Upon function return, execution is redirected to the attacker&rsquo;s code, allowing them to execute arbitrary commands on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5604 allows a remote, unauthenticated attacker to execute arbitrary code on the Tenda CH22 router. This could lead to a complete compromise of the device, allowing the attacker to gain control over network traffic, modify router settings, or use the device as part of a botnet. Given the wide deployment of Tenda routers, a large number of devices could be vulnerable, making this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/CertLocalPrecreate</code> with unusually long <code>standard</code> parameters to identify potential exploit attempts (see rule: &ldquo;Detect Tenda CH22 Buffer Overflow Attempt via Long Standard Parameter&rdquo;).</li>
<li>Implement rate limiting on the <code>/goform/CertLocalPrecreate</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5604.</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda CH22 Router POST Request to CertLocalPrecreate&rdquo; to identify suspicious POST requests to the affected endpoint and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5604</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)</title><link>https://feed.craftedsignal.io/briefs/2026-04-realterm-seh-overflow/</link><pubDate>Sun, 05 Apr 2026 21:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-realterm-seh-overflow/</guid><description>RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.</description><content:encoded><![CDATA[<p>RealTerm Serial Terminal version 2.0.0.70 is vulnerable to a structured exception handling (SEH) buffer overflow in the Echo Port tab. This vulnerability, identified as CVE-2019-25679, allows a local attacker to execute arbitrary code on a vulnerable system. The attack requires the user to be running the RealTerm application. The attacker must craft a malicious payload containing shellcode and a POP POP RET gadget chain and paste it into the Port field within the Echo Port tab. Subsequently, the attacker needs to induce the user to click the &ldquo;Change&rdquo; button, triggering the buffer overflow and allowing arbitrary code execution within the context of the RealTerm application. This poses a significant risk, particularly in environments where RealTerm is used for debugging or serial communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable RealTerm Serial Terminal 2.0.0.70 installation.</li>
<li>The attacker crafts a malicious payload containing shellcode and a POP POP RET gadget chain.</li>
<li>The attacker gains local access to the target system.</li>
<li>The attacker opens the RealTerm application and navigates to the Echo Port tab.</li>
<li>The attacker pastes the malicious payload into the Port field.</li>
<li>The attacker induces the user to click the &ldquo;Change&rdquo; button.</li>
<li>The buffer overflow occurs, overwriting the SEH handler.</li>
<li>The POP POP RET gadget chain is executed, redirecting control to the attacker&rsquo;s shellcode, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2019-25679) allows a local attacker to execute arbitrary code on the affected system. This could lead to complete system compromise, including data theft, installation of malware, or denial of service. Although specific victim counts and targeted sectors are not available, the widespread use of RealTerm in technical environments makes this a potentially significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;RealTerm SEH Overflow Attempt&rdquo; Sigma rule to detect suspicious process creation following the execution of RealTerm with a long string supplied as an argument.</li>
<li>Monitor process creations where the parent process name is Realterm.exe using the &ldquo;RealTerm Suspicious Child Process&rdquo; Sigma rule.</li>
<li>Although not directly available, consider network monitoring to detect anomalies should the attacker install malware after successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25679</category><category>buffer-overflow</category><category>seh</category><category>local-code-execution</category><category>realterm</category></item><item><title>River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-river-past-seh-overflow/</link><pubDate>Sun, 05 Apr 2026 21:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-river-past-seh-overflow/</guid><description>River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.</description><content:encoded><![CDATA[<p>River Past Video Cleaner version 7.6.3 is vulnerable to a structured exception handler (SEH) buffer overflow. This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack involves crafting a malicious input string specifically designed to exploit the way the application handles exceptions related to the Lame_enc.dll library. This vulnerability can be exploited by an unauthenticated, local attacker. A successful exploit results in arbitrary code execution in the context of the application. Defenders should implement detection measures to identify malicious processes spawned by River Past Video Cleaner, or unexpected registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker crafts a malicious input file designed to trigger the buffer overflow.</li>
<li>The attacker places the crafted malicious file in a location accessible to River Past Video Cleaner.</li>
<li>The attacker executes River Past Video Cleaner and instructs it to process the malicious file.</li>
<li>River Past Video Cleaner attempts to load or process the Lame_enc.dll library.</li>
<li>Due to the malicious input, a buffer overflow occurs within the structured exception handler of Lame_enc.dll. This overflow overwrites the saved SEH record on the stack.</li>
<li>When an exception is triggered (as a result of the overflow), the overwritten SEH record is used.</li>
<li>The overwritten SEH record redirects execution to attacker-controlled shellcode.</li>
<li>The attacker&rsquo;s shellcode executes, potentially granting the attacker arbitrary code execution within the context of the River Past Video Cleaner process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code on the victim&rsquo;s machine. This could lead to complete system compromise, data theft, or installation of malware. The vulnerability is specific to River Past Video Cleaner 7.6.3. While specific victim counts are unavailable, the potential impact on any system running the vulnerable software is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations where the parent process is <code>RiverPastVideoCleaner.exe</code>, and the child process is unusual or suspicious (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) using process creation logs (logsource: process_creation). Deploy the Sigma rule provided to detect potentially malicious child processes.</li>
<li>Implement application control policies to prevent the execution of unsigned or untrusted executables in directories associated with River Past Video Cleaner.</li>
<li>Monitor for unexpected registry modifications performed by <code>RiverPastVideoCleaner.exe</code> (logsource: registry_set). The provided Sigma rule detects potentially malicious registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25670</category><category>buffer-overflow</category><category>seh-overflow</category><category>windows</category></item><item><title>R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)</title><link>https://feed.craftedsignal.io/briefs/2026-04-r-buffer-overflow/</link><pubDate>Sun, 05 Apr 2026 21:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-r-buffer-overflow/</guid><description>R i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>R i386 version 3.5.0 contains a local buffer overflow vulnerability, identified as CVE-2019-25656, within the GUI Preferences dialog. This vulnerability allows a local attacker to achieve arbitrary code execution by exploiting a buffer overflow when the application processes user-supplied input in the &lsquo;Language for menus and messages&rsquo; field. By crafting a malicious payload string, an attacker can overwrite the Structured Exception Handler (SEH) records. Successful exploitation would allow attackers to execute arbitrary code with the privileges of the user running the application. This poses a significant risk to systems running this vulnerable version of R, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a Windows system running R i386 3.5.0.</li>
<li>Attacker opens the R application.</li>
<li>Attacker navigates to the GUI Preferences dialog within the R application.</li>
<li>Attacker identifies the &lsquo;Language for menus and messages&rsquo; field within the GUI Preferences.</li>
<li>Attacker crafts a malicious payload string designed to overwrite SEH records, including shellcode for arbitrary code execution.</li>
<li>Attacker inputs the malicious string into the &lsquo;Language for menus and messages&rsquo; field.</li>
<li>The R application attempts to process the attacker-supplied string without proper bounds checking, triggering the buffer overflow.</li>
<li>The crafted payload overwrites the SEH record, redirecting execution flow to the attacker-controlled shellcode, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code on the targeted system. The impact includes potential privilege escalation, allowing the attacker to perform actions with the same privileges as the user running the R application. This could lead to the installation of malware, data exfiltration, or complete system compromise. While specific victim numbers are not available, any system running the vulnerable R i386 3.5.0 is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade R to a version higher than 3.5.0 to patch CVE-2019-25656.</li>
<li>Deploy the Sigma rule to detect the execution of R with a modified command line containing long strings to identify potential exploit attempts.</li>
<li>Monitor network connections originating from R processes for suspicious outbound traffic using network connection logs.</li>
<li>Implement the Sigma rule to detect abnormal process execution originating from the R application to catch potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category><category>cve-2019-25656</category><category>windows</category></item><item><title>Tenda M3 Router Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</link><pubDate>Sun, 05 Apr 2026 13:17:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-m3-overflow/</guid><description>A buffer overflow vulnerability exists in Tenda M3 1.0.0.10 via manipulation of the policyType argument in the setAdvPolicyData function, allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability has been identified in Tenda M3 router version 1.0.0.10. The vulnerability resides in the <code>setAdvPolicyData</code> function within the <code>/goform/setAdvPolicyData</code> file, a part of the Destination Handler component. By manipulating the <code>policyType</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations utilizing the affected Tenda M3 router, potentially allowing attackers to gain unauthorized access to the network or disrupt services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Tenda M3 router exposed to the internet or reachable from their network position.</li>
<li>Attacker sends a crafted HTTP POST request to <code>/goform/setAdvPolicyData</code>.</li>
<li>The POST request includes a malicious <code>policyType</code> argument designed to overflow the buffer in the <code>setAdvPolicyData</code> function.</li>
<li>The <code>setAdvPolicyData</code> function in <code>/goform/setAdvPolicyData</code> processes the <code>policyType</code> argument without proper bounds checking.</li>
<li>The excessive data provided in the <code>policyType</code> argument overwrites adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite critical data or inject malicious code into the process&rsquo;s memory space.</li>
<li>The injected code is executed, giving the attacker control over the router.</li>
<li>The attacker can then use the compromised router as a foothold to pivot to other devices on the network, exfiltrate sensitive data, or cause denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a remote attacker to execute arbitrary code on the Tenda M3 router. This could lead to a complete compromise of the device, allowing the attacker to control network traffic, access sensitive information, or use the router as a launchpad for further attacks within the network. Given the severity and the existence of public exploits, vulnerable routers are at high risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-5567.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setAdvPolicyData</code> with unusually long <code>policyType</code> arguments; deploy the Sigma rule <code>Detect Suspicious PolicyType Argument Length</code> to identify this activity.</li>
<li>Implement network segmentation to limit the potential impact of a compromised router.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the affected endpoint.</li>
<li>Review and restrict access to the router&rsquo;s management interface to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5567</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>webserver</category></item><item><title>Tenda AC10 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-ac10-overflow/</link><pubDate>Sun, 05 Apr 2026 08:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-ac10-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5550) in Tenda AC10 firmware version 16.03.10.10_multi_TDE01 within the /bin/httpd SysToolChangePwd function allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5550, exists in Tenda AC10 router firmware version 16.03.10.10_multi_TDE01. The vulnerability is located in the <code>fromSysToolChangePwd</code> function within the <code>/bin/httpd</code> binary. A remote attacker can exploit this flaw to overwrite the stack and potentially execute arbitrary code on the affected device. This is achieved by sending a specially crafted request to the device. Successful exploitation could lead to complete system compromise, allowing attackers to gain unauthorized access, control the device, or use it as a foothold for further network intrusion. Given the widespread use of Tenda routers, this vulnerability poses a significant risk to home and small business networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Tenda AC10 router running firmware version 16.03.10.10_multi_TDE01.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/bin/httpd</code> endpoint.</li>
<li>The malicious request is designed to overflow the buffer in the <code>fromSysToolChangePwd</code> function when processing the request parameters.</li>
<li>The overflow overwrites the stack with attacker-controlled data, including the return address.</li>
<li>The <code>httpd</code> process attempts to return from the <code>fromSysToolChangePwd</code> function.</li>
<li>Due to the overwritten return address, execution is redirected to the attacker&rsquo;s code.</li>
<li>The attacker&rsquo;s code executes with the privileges of the <code>httpd</code> process.</li>
<li>The attacker gains control of the device and can perform arbitrary actions, such as modifying router settings, executing commands, or establishing a backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5550 allows a remote attacker to gain complete control of the affected Tenda AC10 router. This can lead to data breaches, denial-of-service attacks, or the router being used as part of a botnet. Given the potential for widespread exploitation and the ease with which the vulnerability can be triggered, CVE-2026-5550 poses a high risk to users of the affected Tenda AC10 router model. The attacker could potentially monitor all network traffic passing through the device, steal sensitive information, or use the compromised device to launch attacks against other systems on the network or the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/bin/httpd</code> with abnormally large parameter values that could indicate a buffer overflow attempt targeting the <code>fromSysToolChangePwd</code> function to trigger the vulnerability (see the related Sigma rule below).</li>
<li>Since a patch is not mentioned, consider replacing the affected Tenda AC10 device or isolating it from critical network segments if immediate replacement is not feasible.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5550</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Snes9K 0.0.9z Buffer Overflow Vulnerability (CVE-2018-25251)</title><link>https://feed.craftedsignal.io/briefs/2026-04-snes9k-overflow/</link><pubDate>Sat, 04 Apr 2026 14:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-snes9k-overflow/</guid><description>Snes9K 0.0.9z is vulnerable to a buffer overflow in the Netplay Socket Port Number field, enabling local attackers to execute arbitrary code via a crafted payload.</description><content:encoded><![CDATA[<p>Snes9K version 0.0.9z contains a buffer overflow vulnerability (CVE-2018-25251) within the Netplay functionality. Specifically, the application fails to properly validate the size of user-supplied input for the &ldquo;Netplay Socket Port Number&rdquo; field. By exploiting this vulnerability, a local attacker can overwrite the Structured Exception Handler (SEH) chain. Successful exploitation allows an attacker to execute arbitrary code within the context of the running Snes9K application, potentially leading to complete system compromise. The vulnerability resides within the Netplay Options menu, accessible from the Snes9K interface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Snes9K 0.0.9z installed.</li>
<li>The attacker opens the Snes9K application.</li>
<li>The attacker navigates to the &ldquo;Netplay Options&rdquo; menu within the application.</li>
<li>The attacker locates the &ldquo;Netplay Socket Port Number&rdquo; field.</li>
<li>The attacker crafts a malicious payload designed to overwrite the SEH chain. This payload includes the address of the attacker&rsquo;s shellcode.</li>
<li>The attacker pastes the malicious payload into the &ldquo;Netplay Socket Port Number&rdquo; field, exceeding the expected buffer size.</li>
<li>The application attempts to handle the overflow, triggering the SEH.</li>
<li>The SEH is overwritten by the attacker&rsquo;s payload, redirecting execution to the attacker&rsquo;s shellcode. This results in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code on the affected system. This could lead to complete system compromise, including data theft, installation of malware, and further lateral movement within the network. While the vulnerability requires local access, it could be leveraged as part of a more complex attack chain, for example, after initial access is gained through a separate vulnerability or social engineering.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the execution of Snes9K followed by unusual process creation, using the <code>process_creation</code> Sigma rule provided below.</li>
<li>Monitor for applications writing to Snes9K configuration files followed by the execution of Snes9K, using the <code>file_event</code> and <code>process_creation</code> Sigma rules provided below.</li>
<li>Consider removing the vulnerable software from systems or restricting access to it until a patched version is available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25251</category><category>snes9k</category></item><item><title>V-SFT Stack-Based Buffer Overflow Vulnerability (CVE-2026-32928)</title><link>https://feed.craftedsignal.io/briefs/2026-04-v-sft-overflow/</link><pubDate>Wed, 01 Apr 2026 23:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-v-sft-overflow/</guid><description>V-SFT versions 6.2.10.0 and prior are susceptible to a stack-based buffer overflow vulnerability that could allow arbitrary code execution when a malicious V7 file is opened.</description><content:encoded><![CDATA[<p>V-SFT versions 6.2.10.0 and earlier are vulnerable to a stack-based buffer overflow (CVE-2026-32928) located in the VS6ComFile!CSaveData::_conv_AnimationItem function. This vulnerability is triggered when the software processes a specially crafted V7 file. Successful exploitation of this vulnerability can lead to arbitrary code execution within the context of the application. Given the potential for complete system compromise, organizations using affected versions of V-SFT should take immediate steps to mitigate this risk. This vulnerability was reported by JPCERT/CC.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target using a vulnerable version of V-SFT (&lt;= 6.2.10.0).</li>
<li>Attacker crafts a malicious V7 file designed to trigger the buffer overflow in the <code>VS6ComFile!CSaveData::_conv_AnimationItem</code> function.</li>
<li>The attacker delivers the malicious V7 file to the target, potentially through social engineering or other means.</li>
<li>The target user opens the malicious V7 file using the vulnerable V-SFT software.</li>
<li>The <code>VS6ComFile!CSaveData::_conv_AnimationItem</code> function processes the V7 file, copying data into a fixed-size buffer on the stack.</li>
<li>The crafted V7 file contains data exceeding the buffer&rsquo;s capacity, causing a buffer overflow.</li>
<li>The overflow overwrites adjacent stack memory, including the return address.</li>
<li>When the <code>_conv_AnimationItem</code> function returns, execution is redirected to an attacker-controlled address, allowing arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32928 allows an attacker to execute arbitrary code on the affected system. This could lead to complete system compromise, data theft, or denial of service. The vulnerability affects any system running V-SFT versions 6.2.10.0 and prior. The severity is rated as high with a CVSS v3.1 score of 7.8.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a non-vulnerable version of V-SFT (later than 6.2.10.0) as provided by the vendor.</li>
<li>Monitor process creation events for V-SFT processes spawning child processes or executing unusual commands, using the provided Sigma rule.</li>
<li>Implement file integrity monitoring for the V-SFT executable and associated libraries to detect unauthorized modifications.</li>
<li>Educate users about the risks of opening files from untrusted sources to mitigate social engineering attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32928</category><category>buffer-overflow</category><category>code-execution</category><category>v-sft</category></item><item><title>Mbed TLS FFDH Public Key Export Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-04-mbedtls-overflow/</link><pubDate>Wed, 01 Apr 2026 18:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mbedtls-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-34875) exists in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0 during public key export for FFDH keys, potentially leading to code execution or denial of service.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability has been identified in Mbed TLS, a widely used open-source cryptographic library. Specifically, CVE-2026-34875 affects Mbed TLS versions up to 3.6.5 and TF-PSA-Crypto 1.0.0. The vulnerability is triggered during the export of public keys associated with Finite Field Diffie-Hellman (FFDH) algorithms. This flaw can be exploited by an attacker to overwrite memory buffers, potentially leading to arbitrary code execution or a denial-of-service condition. Given the prevalence of Mbed TLS in embedded systems and other security-sensitive applications, this vulnerability poses a significant risk to a wide range of devices and services. Defenders should prioritize patching and mitigation efforts to prevent potential exploitation. The vulnerability was published on 2026-04-01.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system using a vulnerable version of Mbed TLS (&lt;= 3.6.5) or TF-PSA-Crypto (1.0.0).</li>
<li>Attacker crafts a malicious request that triggers the FFDH public key export function.</li>
<li>The vulnerable function fails to properly validate the size of the buffer used to store the exported public key.</li>
<li>The application attempts to copy the public key data into the undersized buffer.</li>
<li>A buffer overflow occurs, overwriting adjacent memory regions.</li>
<li>The attacker gains control of program execution by overwriting critical data structures or function pointers.</li>
<li>The attacker executes arbitrary code on the target system.</li>
<li>The attacker achieves their final objective, such as gaining unauthorized access, stealing sensitive data, or causing a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34875 can lead to a variety of severe consequences. The most critical outcome is arbitrary code execution, allowing attackers to gain complete control over the affected system. This could result in the theft of sensitive data, installation of malware, or disruption of critical services. Even without achieving code execution, the buffer overflow can cause a denial-of-service condition, rendering the system unusable. The wide adoption of Mbed TLS means that this vulnerability has the potential to impact numerous devices and applications across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Mbed TLS to a patched version (later than 3.6.5) or TF-PSA-Crypto to a version that includes the fix for CVE-2026-34875.</li>
<li>Apply input validation to any data that is used in the FFDH public key export functionality as a short-term workaround.</li>
<li>Deploy the provided Sigma rule <code>Detect_MbedTLS_FFDH_Public_Key_Export</code> to identify potential exploitation attempts by monitoring process memory writes in Mbed TLS processes.</li>
<li>Monitor web server logs for anomalies in requests related to TLS key exchange, in combination with MbedTLS to catch abnormal activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>mbedtls</category><category>crypto</category><category>cve-2026-34875</category></item><item><title>Tenda CH22 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5204)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-bo/</link><pubDate>Tue, 31 Mar 2026 16:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5204) exists in the Tenda CH22 1.0.0.1 router, allowing remote attackers to execute arbitrary code by manipulating the webSiteId argument in the formWebTypeLibrary function.</description><content:encoded><![CDATA[<p>CVE-2026-5204 describes a critical stack-based buffer overflow vulnerability affecting Tenda CH22 router version 1.0.0.1. The vulnerability resides within the <code>formWebTypeLibrary</code> function in the <code>/goform/webtypelibrary</code> file, which handles web-based parameter input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the router, manipulating the <code>webSiteId</code> argument to overwrite the stack buffer. This allows for arbitrary code execution on the device. Given the router&rsquo;s role as a network gateway, successful exploitation can lead to complete compromise of the device and potentially the entire network behind it. The availability of a public exploit increases the risk of widespread exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/webtypelibrary</code> endpoint.</li>
<li>The crafted request includes the <code>webSiteId</code> parameter with a payload exceeding the expected buffer size, triggering the stack-based buffer overflow in the <code>formWebTypeLibrary</code> function.</li>
<li>The overflow overwrites critical data on the stack, including the return address.</li>
<li>The overwritten return address is replaced with the address of malicious code injected into the payload or a pre-existing code location within the router&rsquo;s firmware (Return-Oriented Programming - ROP).</li>
<li>The <code>formWebTypeLibrary</code> function returns, transferring control to the attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes, granting the attacker control over the device.</li>
<li>The attacker can then use this control to further compromise the network or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5204 allows a remote attacker to execute arbitrary code on the vulnerable Tenda CH22 router. This can lead to complete control of the device, enabling the attacker to intercept network traffic, modify DNS settings, create VPNs, or launch further attacks on devices within the network. Given that routers are essential network devices, a successful attack can have a significant impact, affecting all connected devices and potentially exposing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates for Tenda CH22 routers immediately to patch CVE-2026-5204.</li>
<li>Deploy the Sigma rule <code>Tenda-CH22-WebSiteId-Buffer-Overflow</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/webtypelibrary</code> with unusually long <code>webSiteId</code> parameters, as indicated by <code>WebSiteId_Length_Detection</code> Sigma rule.</li>
<li>Implement network segmentation to limit the impact of a potential router compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5204</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-overflow/</link><pubDate>Tue, 31 Mar 2026 00:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1 via manipulation of the `mit_linktype` argument in the `/goform/QuickIndex` endpoint, potentially enabling remote code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda CH22 router version 1.0.0.1. The vulnerability resides within the <code>formQuickIndex</code> function of the <code>/goform/QuickIndex</code> file, which is a component of the Parameter Handler. This flaw can be triggered by manipulating the <code>mit_linktype</code> argument, leading to a buffer overflow on the stack. The vulnerability is remotely exploitable, meaning an attacker can trigger the flaw over the network without needing local access to the device. The existence of a public exploit further increases the risk of potential exploitation by malicious actors. Successful exploitation could allow an attacker to execute arbitrary code on the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda CH22 router running firmware version 1.0.0.1 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/QuickIndex</code> endpoint.</li>
<li>The malicious request includes the <code>mit_linktype</code> argument with a payload exceeding the expected buffer size.</li>
<li>The Tenda CH22 router processes the HTTP request and passes the <code>mit_linktype</code> argument to the <code>formQuickIndex</code> function.</li>
<li>The <code>formQuickIndex</code> function copies the attacker-controlled <code>mit_linktype</code> data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>Due to the oversized payload, the copy operation overflows the buffer, overwriting adjacent memory on the stack, including the return address.</li>
<li>The <code>formQuickIndex</code> function completes and attempts to return to the caller function.</li>
<li>Due to the overwritten return address, control is redirected to attacker-controlled code, enabling arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the Tenda CH22 router. This can lead to a variety of malicious outcomes, including complete device compromise, denial of service, and the potential to use the router as a launchpad for further attacks on the local network or the internet. Given that routers are often used in both home and small business environments, a successful attack could affect a wide range of users and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to <code>/goform/QuickIndex</code> with unusually long <code>mit_linktype</code> parameters to detect potential exploitation attempts. Implement the Sigma rule <code>Detect Tenda CH22 mit_linktype Buffer Overflow Attempt</code> against web server logs.</li>
<li>Implement rate limiting on the <code>/goform/QuickIndex</code> endpoint to mitigate potential denial-of-service attacks stemming from exploitation.</li>
<li>Since the source material identifies CWE-119 and CWE-121 as root causes, review code practices related to buffer handling and implement stricter input validation procedures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5156</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda CH22 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-buffer-overflow/</link><pubDate>Mon, 30 Mar 2026 23:17:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ch22-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda CH22 1.0.0.1/1.If allowing remote attackers to execute arbitrary code by manipulating the `funcname` argument in the `/goform/setcfm` endpoint.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5154, has been discovered in Tenda CH22 firmware version 1.0.0.1/1.If. The vulnerability resides within the <code>fromSetCfm</code> function in the <code>/goform/setcfm</code> file, a component of the Parameter Handler. Successful exploitation allows remote attackers to execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to affected Tenda CH22 devices, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda CH22 device running firmware version 1.0.0.1/1.If.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setcfm</code> endpoint.</li>
<li>The request includes the <code>funcname</code> argument containing a string exceeding the buffer size allocated to it.</li>
<li>The <code>fromSetCfm</code> function processes the malicious <code>funcname</code> argument without proper bounds checking.</li>
<li>The oversized <code>funcname</code> value overflows the stack buffer, overwriting adjacent memory regions.</li>
<li>The attacker overwrites the return address on the stack with an address pointing to malicious code or a ROP chain.</li>
<li>The <code>fromSetCfm</code> function returns, causing execution to jump to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the device, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected Tenda CH22 device. This can result in complete device compromise, allowing the attacker to control the device, steal sensitive information, or use the device as a foothold for further attacks on the network. Given the availability of public exploits, a large number of devices could be compromised if left unpatched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/setcfm</code> with unusually long <code>funcname</code> parameters, using the provided Sigma rule.</li>
<li>Implement rate limiting on requests to <code>/goform/setcfm</code> to mitigate potential brute-force exploitation attempts.</li>
<li>Apply any available patches or firmware updates from Tenda to address CVE-2026-5154.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5154</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda FH1201 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5046)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-overflow/</link><pubDate>Sun, 29 Mar 2026 15:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5046) in Tenda FH1201 version 1.2.0.14(408) allows remote attackers to execute arbitrary code by manipulating the GO argument in the formWrlExtraSet function of the /goform/WrlExtraSet component.</description><content:encoded><![CDATA[<p>CVE-2026-5046 is a stack-based buffer overflow vulnerability affecting Tenda FH1201 routers running firmware version 1.2.0.14(408). The vulnerability resides within the <code>formWrlExtraSet</code> function of the <code>/goform/WrlExtraSet</code> component, specifically in the handling of the <code>GO</code> argument. A remote attacker can exploit this flaw by sending a crafted HTTP request with a maliciously oversized <code>GO</code> parameter, overwriting the stack and potentially gaining arbitrary code execution on the device. The…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5046</category><category>tenda</category><category>buffer-overflow</category><category>router</category></item><item><title>Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-belkin-overflow/</link><pubDate>Sun, 29 Mar 2026 13:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-belkin-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>A critical security vulnerability, CVE-2026-5044, has been identified in Belkin F9K1122 router version 1.00.33. The vulnerability resides within the <code>formSetSystemSettings</code> function of the <code>/goform/formSetSystemSettings</code> file, which is part of the Setting Handler component. Successful exploitation allows a remote attacker to trigger a stack-based buffer overflow by manipulating the <code>webpage</code> argument. This could result in arbitrary code execution on the device. Publicly available exploit code…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5044</category><category>buffer-overflow</category><category>belkin</category><category>router</category></item><item><title>Belkin F9K1122 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-belkin-buffer-overflow/</link><pubDate>Sun, 29 Mar 2026 11:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-belkin-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5042) exists in the Belkin F9K1122 router version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the webpage argument in the formCrossBandSwitch function.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability, identified as CVE-2026-5042, has been discovered in Belkin F9K1122 routers running firmware version 1.00.33. The vulnerability resides within the <code>formCrossBandSwitch</code> function of the <code>/goform/formCrossBandSwitch</code> file, a component of the Parameter Handler. Successful exploitation could allow a remote, unauthenticated attacker to execute arbitrary code on the device. Publicly available exploit code increases the risk of widespread…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5042</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda 4G06 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5036)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-4g06-bo/</link><pubDate>Sun, 29 Mar 2026 08:15:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-4g06-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-5036) exists in the fromDhcpListClient function of the Tenda 4G06 router (version 04.06.01.29), potentially allowing remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/DhcpListClient endpoint.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-5036, affects the Tenda 4G06 router, specifically version 04.06.01.29. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> endpoint. A remote attacker can exploit this by crafting a malicious request that manipulates the <code>page</code> argument, leading to a buffer overflow on the stack. This could allow the attacker to potentially execute arbitrary code on the device. Given the…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5036</category><category>buffer-overflow</category><category>router</category><category>tenda</category></item><item><title>Tenda F453 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5021)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-f453-overflow/</link><pubDate>Sun, 29 Mar 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-f453-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda F453 1.0.0.3 allows a remote attacker to execute arbitrary code by manipulating the 'delno' argument in the fromPPTPUserSetting function of the /goform/PPTPUserSetting component's httpd process.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-5021, has been discovered in Tenda F453 router version 1.0.0.3. This vulnerability resides within the <code>fromPPTPUserSetting</code> function of the <code>/goform/PPTPUserSetting</code> component, specifically in the <code>httpd</code> process. The vulnerability can be triggered by manipulating the <code>delno</code> argument. Successful exploitation allows remote attackers to potentially execute arbitrary code on the affected device. Publicly available exploit code…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5021</category><category>buffer-overflow</category><category>router</category></item><item><title>Wavlink WL-WN579X3-C Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wavlink-overflow/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wavlink-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Wavlink WL-WN579X3-C 231124's UPNP Handler component, specifically in the /cgi-bin/firewall.cgi file and the sub_4019FC function, allowing remote attackers to execute arbitrary code by manipulating the UpnpEnabled argument; public exploits are available, but the vendor has not responded to the disclosure.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-5004, affects the Wavlink WL-WN579X3-C 231124 router. The vulnerability lies within the UPNP Handler component, specifically the <code>/cgi-bin/firewall.cgi</code> file&rsquo;s <code>sub_4019FC</code> function. By manipulating the <code>UpnpEnabled</code> argument, a remote attacker can trigger a stack-based buffer overflow. This can lead to arbitrary code execution on the device. Public exploits for this vulnerability are available, increasing the risk of widespread exploitation. Despite responsible disclosure attempts, the vendor has not provided a patch or response, leaving users vulnerable. This is a significant concern for network security, especially for devices exposed to the internet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Wavlink WL-WN579X3-C 231124 router exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/cgi-bin/firewall.cgi</code>.</li>
<li>The HTTP request includes a manipulated <code>UpnpEnabled</code> argument designed to overflow the buffer in the <code>sub_4019FC</code> function.</li>
<li>The vulnerable <code>sub_4019FC</code> function processes the <code>UpnpEnabled</code> argument without proper bounds checking.</li>
<li>The buffer overflow occurs, overwriting adjacent memory on the stack, including the return address.</li>
<li>The overwritten return address points to attacker-controlled code.</li>
<li>Upon function return, execution jumps to the attacker-controlled code, allowing arbitrary commands to be executed.</li>
<li>The attacker gains remote code execution, potentially allowing complete control of the device, including network access and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5004 allows a remote attacker to execute arbitrary code on the vulnerable Wavlink WL-WN579X3-C 231124 router. This could lead to complete device compromise, including unauthorized network access, data exfiltration, and the potential use of the router as a botnet node. Given the availability of public exploits, a widespread exploitation is possible, affecting potentially thousands of devices. The lack of vendor response exacerbates the risk, as no official patch is available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Firewall CGI Requests</code> to your SIEM and tune for your environment to identify potential exploitation attempts targeting the <code>/cgi-bin/firewall.cgi</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detect UPNP Enabled Overflow</code> to detect possible overflows.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/firewall.cgi</code> with unusually long <code>UpnpEnabled</code> parameters.</li>
<li>If possible, isolate Wavlink WL-WN579X3-C 231124 routers from direct internet exposure until a patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer-overflow</category><category>router</category></item><item><title>Crashmail 1.6 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-crashmail-bo/</link><pubDate>Sat, 28 Mar 2026 12:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-crashmail-bo/</guid><description>Crashmail 1.6 is vulnerable to a stack-based buffer overflow, allowing remote attackers to execute arbitrary code via malicious input and potentially leading to denial of service.</description><content:encoded><![CDATA[<p>Crashmail 1.6 is susceptible to a stack-based buffer overflow vulnerability (CVE-2018-25223) that allows remote attackers to execute arbitrary code. This vulnerability is triggered when the application receives specially crafted input designed to overwrite the stack. Attackers can leverage Return-Oriented Programming (ROP) chains to achieve code execution within the context of the application. Failed exploitation attempts may result in a denial-of-service condition, impacting application availability. Given the network-accessible nature of the vulnerability and the potential for arbitrary code execution, it poses a significant risk to systems running Crashmail 1.6.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Crashmail 1.6 server exposed to the network.</li>
<li>The attacker crafts a malicious input specifically designed to exploit the stack-based buffer overflow vulnerability (CVE-2018-25223). This input includes shellcode or a ROP chain.</li>
<li>The attacker sends the malicious input to the Crashmail application via a network connection.</li>
<li>The application processes the malicious input, triggering the buffer overflow when copying the input data to a fixed-size buffer on the stack.</li>
<li>The overflow overwrites critical stack data, including the return address of the current function.</li>
<li>Upon function return, control is redirected to the attacker-controlled address, initiating the execution of the injected shellcode or ROP chain.</li>
<li>The shellcode or ROP chain executes arbitrary commands, potentially including installing malware, creating new user accounts, or exfiltrating sensitive data.</li>
<li>If the exploit fails, the application may crash, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected system. This could lead to complete system compromise, including data theft, malware installation, and denial of service. Given the critical CVSS score of 9.8, organizations running vulnerable versions of Crashmail are at high risk. The number of potential victims is dependent on the number of Crashmail 1.6 installations exposed to network traffic.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrades to mitigate CVE-2018-25223 in Crashmail 1.6.</li>
<li>Monitor network traffic for suspicious patterns indicative of exploit attempts targeting Crashmail, using the process_creation Sigma rule below to detect unexpected processes.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts by monitoring process creations spawned from the crashmail process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2018-25223</category></item><item><title>SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)</title><link>https://feed.craftedsignal.io/briefs/2026-03-sc-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-sc-buffer-overflow/</guid><description>SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.</description><content:encoded>&lt;p>SC v7.16 is susceptible to a stack-based buffer overflow vulnerability, identified as CVE-2018-25222. This flaw enables local attackers to execute arbitrary code by crafting malicious input that exceeds buffer boundaries. Specifically, providing an input string longer than 1052 bytes can overwrite the instruction pointer, enabling the execution of attacker-controlled shellcode within the application&amp;rsquo;s context. This vulnerability poses a significant threat to systems running the affected version…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>CVE-2018-25222</category></item><item><title>Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)</title><link>https://feed.craftedsignal.io/briefs/2026-03-flat-assembler-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-flat-assembler-overflow/</guid><description>Flat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.</description><content:encoded>&lt;p>The Flat Assembler (FASM) version 1.71.21 is vulnerable to a stack-based buffer overflow (CVE-2017-20228). This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack requires the attacker to supply a specially crafted assembly file as input to FASM. By providing an input file larger than 5895 bytes, the attacker can overwrite the instruction pointer, leading to arbitrary code execution. This is achieved through return-oriented programming (ROP)…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2017-20228</category><category>buffer-overflow</category><category>local-privilege-escalation</category></item><item><title>EChat Server 3.1 Buffer Overflow Vulnerability in chat.ghp Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-03-echat-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-echat-buffer-overflow/</guid><description>EChat Server 3.1 is vulnerable to a buffer overflow in the chat.ghp endpoint, allowing remote attackers to execute arbitrary code by sending a crafted GET request with an oversized username parameter.</description><content:encoded><![CDATA[<p>EChat Server 3.1 is susceptible to a critical buffer overflow vulnerability (CVE-2018-25221) located in the <code>chat.ghp</code> endpoint. This flaw allows an unauthenticated remote attacker to execute arbitrary code within the context of the application. The attack is achieved by sending a specially crafted HTTP GET request to the vulnerable endpoint, including an oversized <code>username</code> parameter. The excessive length of the username causes a buffer overflow, enabling the attacker to inject and execute malicious shellcode and ROP gadgets. Successful exploitation grants the attacker complete control over the targeted EChat Server instance. This vulnerability poses a significant risk to organizations using the affected EChat Server version, potentially leading to data breaches, system compromise, and service disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an EChat Server 3.1 instance.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>chat.ghp</code> endpoint.</li>
<li>The GET request includes a <code>username</code> parameter with a value exceeding the expected buffer size.</li>
<li>The oversized username value contains shellcode designed for arbitrary code execution.</li>
<li>The <code>chat.ghp</code> endpoint processes the GET request without proper bounds checking on the <code>username</code> parameter.</li>
<li>The excessive username data overwrites adjacent memory regions, including return addresses on the stack.</li>
<li>The overwritten return addresses are manipulated to point to ROP gadgets and the injected shellcode.</li>
<li>Upon returning from the <code>chat.ghp</code> handler, the hijacked execution flow executes the attacker&rsquo;s shellcode, granting them control of the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the buffer overflow vulnerability (CVE-2018-25221) in EChat Server 3.1 enables remote attackers to execute arbitrary code on the affected server. This can lead to complete system compromise, including the ability to install malware, steal sensitive data, or disrupt services. Given the severity and ease of exploitation, any organization running EChat Server 3.1 is at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>username</code> parameter in <code>chat.ghp</code> to prevent buffer overflows (reference CVE-2018-25221).</li>
<li>Monitor web server logs for unusually long GET requests targeting the <code>chat.ghp</code> endpoint as identified in the attack chain (see rule: &ldquo;Detect Suspiciously Long GET Requests to chat.ghp&rdquo;).</li>
<li>Implement runtime protection mechanisms to detect and prevent shellcode execution, mitigating successful exploitation attempts.</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>echat</category></item><item><title>PInfo 0.6.9-5.1 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-pinfo-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pinfo-buffer-overflow/</guid><description>PInfo version 0.6.9-5.1 is susceptible to a local buffer overflow vulnerability, enabling local attackers to execute arbitrary code by providing an overly large argument to the '-m' parameter, ultimately allowing for shellcode execution with user privileges.</description><content:encoded><![CDATA[<p>PInfo 0.6.9-5.1 contains a critical local buffer overflow vulnerability (CVE-2016-20044) that allows a malicious local attacker to execute arbitrary code. This vulnerability stems from the application&rsquo;s insufficient input validation when handling the &lsquo;-m&rsquo; parameter. By exploiting this flaw, an attacker can overwrite the instruction pointer and gain unauthorized access. This can potentially lead to full system compromise. The attacker crafts a malicious input string with 564 bytes of padding followed by a return address.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to the vulnerable system.</li>
<li>The attacker identifies the PInfo binary (likely located in /usr/bin or /usr/local/bin).</li>
<li>The attacker crafts a malicious input string exceeding the buffer size allocated for the &lsquo;-m&rsquo; parameter. This malicious string includes 564 bytes of padding.</li>
<li>The attacker appends a return address to the malicious string, pointing to a memory location containing the attacker&rsquo;s shellcode.</li>
<li>The attacker executes the PInfo binary with the crafted malicious input as an argument to the &lsquo;-m&rsquo; parameter. <code>pinfo -m &quot;A&quot;*564 + &lt;return_address&gt;</code>.</li>
<li>The buffer overflow occurs, overwriting the return address on the stack.</li>
<li>When the PInfo function returns, it jumps to the attacker-controlled address, executing the shellcode.</li>
<li>The attacker&rsquo;s shellcode executes with the privileges of the user running PInfo. This can lead to privilege escalation if PInfo is run by a privileged user or via setuid.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running the vulnerable PInfo application. This could lead to sensitive data disclosure, unauthorized modification of system files, or complete system compromise. While the exact number of affected systems is unknown, any system running PInfo 0.6.9-5.1 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a version of PInfo that addresses CVE-2016-20044.</li>
<li>Monitor process creation events for executions of <code>pinfo</code> with unusually long arguments to the <code>-m</code> parameter, using the Sigma rule provided.</li>
<li>Implement strict input validation for all command-line arguments in applications to prevent buffer overflows.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>local-privilege-escalation</category><category>cve-2016-20044</category></item><item><title>yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)</title><link>https://feed.craftedsignal.io/briefs/2026-03-ytree-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ytree-buffer-overflow/</guid><description>yTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.</description><content:encoded>&lt;p>yTree versions 1.94 to 1.1 are susceptible to a stack-based buffer overflow vulnerability (CVE-2016-20038). A local attacker can exploit this flaw by providing an overly long command-line argument to the application. The vulnerability allows the attacker to overwrite the stack memory, inject and execute arbitrary code within the context of the yTree application. This could lead to a full system compromise if the attacker gains sufficient privileges. This vulnerability has been publicly known…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2016-20038</category><category>buffer-overflow</category><category>local-code-execution</category></item><item><title>TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tiemu-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tiemu-buffer-overflow/</guid><description>TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.</description><content:encoded>&lt;p>TiEmu, a Texas Instruments (TI) calculator emulator, version 3.03-nogdb+dfsg-3, is susceptible to a buffer overflow vulnerability (CVE-2016-20040). This flaw resides within the handling of ROM parameters passed via the command-line interface. An unauthenticated, local attacker can exploit this vulnerability by supplying an oversized ROM parameter. Successful exploitation allows the attacker to crash the application, potentially leading to a denial of service, or, more seriously, execute…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2016-20040</category><category>buffer-overflow</category><category>local-privilege-escalation</category></item><item><title>Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)</title><link>https://feed.craftedsignal.io/briefs/2026-03-mess-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-mess-buffer-overflow/</guid><description>Multi Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.</description><content:encoded><![CDATA[<p>Multi Emulator Super System (MESS) version 0.154-3.1 is susceptible to a buffer overflow vulnerability, identified as CVE-2016-20039. This flaw resides in the handling of the &ldquo;gamma&rdquo; parameter. A local attacker can exploit this vulnerability by providing an overly large value for the gamma parameter. Successful exploitation allows the attacker to overwrite the stack buffer, potentially leading to arbitrary code execution and complete system compromise. This vulnerability was reported in March…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer overflow</category><category>code execution</category></item><item><title>xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)</title><link>https://feed.craftedsignal.io/briefs/2026-03-xwpe-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 12:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xwpe-buffer-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.</description><content:encoded>&lt;p>The xwpe application, version 1.5.30a-2.1 and prior, contains a stack-based buffer overflow vulnerability (CVE-2016-20037). This vulnerability allows a local attacker to execute arbitrary code or cause a denial of service. The attack involves crafting a malicious command-line argument with an input string exceeding buffer boundaries. Specifically, the attacker can supply 262 bytes of junk data, followed by shellcode, to overwrite the instruction pointer and gain control of the application&amp;rsquo;s…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer-overflow</category><category>code-execution</category></item><item><title>Tenda AC15 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4975)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac15-bo/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac15-bo/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4975) exists in the Tenda AC15 router version 15.03.05.19, allowing remote attackers to execute arbitrary code by manipulating the 'funcpara1' argument in a POST request to /goform/setcfm.</description><content:encoded><![CDATA[<p>CVE-2026-4975 is a critical security vulnerability affecting Tenda AC15 routers running firmware version 15.03.05.19. This vulnerability resides in the <code>formSetCfm</code> function, specifically within the <code>/goform/setcfm</code> file, which handles POST requests. An attacker can exploit a stack-based buffer overflow by sending a crafted POST request with a malicious payload in the <code>funcpara1</code> argument. The vulnerability is remotely exploitable, meaning an attacker does not need local access to the device…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer overflow</category><category>cve-2026-4975</category></item><item><title>eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)</title><link>https://feed.craftedsignal.io/briefs/2026-03-eswifi-buffer-overflow/</link><pubDate>Sat, 28 Mar 2026 00:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-eswifi-buffer-overflow/</guid><description>CVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.</description><content:encoded><![CDATA[<p>CVE-2026-1679 is a buffer overflow vulnerability affecting the eswifi socket offload driver. The vulnerability arises because the driver copies user-provided payloads into a fixed-size buffer without validating the input size. This can lead to an overflow of the <code>eswifi-&gt;buf</code> buffer, resulting in corruption of kernel memory (CWE-120). The Zephyr Project assigned a CVSS v3.1 score of 7.3 to this vulnerability. Exploitation requires local code execution to call the socket send API; it is not…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-1679</category><category>buffer-overflow</category><category>kernel-memory-corruption</category></item><item><title>Totolink LR350 Remote Buffer Overflow Vulnerability (CVE-2026-4976)</title><link>https://feed.craftedsignal.io/briefs/2026-03-totolink-buffer-overflow/</link><pubDate>Fri, 27 Mar 2026 21:17:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-totolink-buffer-overflow/</guid><description>A buffer overflow vulnerability in Totolink LR350 version 9.3.5u.6369_B20220309 allows a remote attacker to execute arbitrary code by manipulating the 'ssid' argument in the setWiFiGuestCfg function.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-4976, has been identified in Totolink LR350 routers running firmware version 9.3.5u.6369_B20220309. The vulnerability resides in the <code>setWiFiGuestCfg</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file. By crafting a malicious HTTP request and manipulating the <code>ssid</code> argument, a remote, unauthenticated attacker can trigger a buffer overflow, potentially leading to arbitrary code execution on the device. The availability of a public exploit…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4976</category><category>buffer-overflow</category><category>totolink</category><category>router</category><category>remote-code-execution</category></item><item><title>Tenda AC7 Stack-Based Buffer Overflow in SetSysTimeCfg</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac7-overflow/</link><pubDate>Fri, 27 Mar 2026 20:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac7-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda AC7 version 15.03.06.44 within the fromSetSysTime function of the /goform/SetSysTimeCfg component's POST Request Handler, allowing a remote attacker to potentially execute arbitrary code by manipulating the 'Time' argument.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda AC7 router firmware, specifically version 15.03.06.44. The vulnerability resides in the <code>fromSetSysTime</code> function within the <code>/goform/SetSysTimeCfg</code> component, which handles POST requests. A remote attacker can exploit this flaw by crafting a malicious POST request with an overly long <code>Time</code> argument, causing a buffer overflow on the stack. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could lead to arbitrary code execution on the device, potentially granting the attacker complete control over the router. This is a critical vulnerability due to the ease of remote exploitation and the potential for significant impact.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda AC7 router running firmware version 15.03.06.44.</li>
<li>Attacker crafts a POST request targeting the <code>/goform/SetSysTimeCfg</code> endpoint.</li>
<li>The POST request includes the <code>Time</code> argument, set to a string exceeding the expected buffer size.</li>
<li>The <code>fromSetSysTime</code> function processes the <code>Time</code> argument without proper bounds checking.</li>
<li>The overly long <code>Time</code> argument overflows the stack buffer during the copy operation.</li>
<li>The buffer overflow overwrites critical data on the stack, including the return address.</li>
<li>The attacker controls the overwritten return address, redirecting execution flow to malicious code.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the affected Tenda AC7 router. This can lead to a variety of malicious outcomes, including complete device compromise, modification of router settings (DNS, firewall rules), interception of network traffic, and use of the router as a botnet node. Given the widespread use of Tenda routers, a large number of devices could be vulnerable, potentially impacting home users and small businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-4974.</li>
<li>Monitor webserver logs for POST requests to <code>/goform/SetSysTimeCfg</code> with abnormally long <code>Time</code> parameters, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/goform/SetSysTimeCfg</code> endpoint to mitigate brute-force attempts to exploit the vulnerability.</li>
<li>Deploy the Sigma rule to detect processes spawned by the webserver after the exploit is triggered.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>buffer-overflow</category><category>router</category></item><item><title>Tenda AC6 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</link><pubDate>Fri, 27 Mar 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac6-overflow/</guid><description>A stack-based buffer overflow vulnerability in Tenda AC6 version 15.03.05.16 allows remote attackers to execute arbitrary code by manipulating the WANT/WANS argument in the /goform/WizardHandle POST request handler.</description><content:encoded><![CDATA[<p>A critical stack-based buffer overflow vulnerability has been identified in Tenda AC6 router firmware version 15.03.05.16. The vulnerability, tracked as CVE-2026-4960, resides within the <code>fromWizardHandle</code> function of the <code>/goform/WizardHandle</code> component, which handles POST requests. A remote attacker can exploit this vulnerability by sending a crafted POST request with a manipulated <code>WANT</code> or <code>WANS</code> argument, leading to arbitrary code execution on the device. Public exploit code is available, increasing the risk of widespread exploitation. This vulnerability poses a significant threat, potentially allowing attackers to gain complete control over vulnerable routers and compromise connected networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda AC6 router running firmware version 15.03.05.16.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Within the POST request, the attacker manipulates the <code>WANT</code> or <code>WANS</code> argument to inject a payload exceeding the buffer size.</li>
<li>The router processes the POST request, passing the attacker-controlled input to the vulnerable <code>fromWizardHandle</code> function.</li>
<li>The overflow occurs when the <code>fromWizardHandle</code> function copies the attacker-supplied data into a fixed-size buffer on the stack without proper bounds checking.</li>
<li>The injected payload overwrites adjacent memory locations on the stack, including the return address.</li>
<li>When the <code>fromWizardHandle</code> function returns, it jumps to the attacker-controlled address.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to gain complete control of the affected Tenda AC6 router. This can lead to a variety of malicious outcomes, including network hijacking, DNS poisoning, interception of network traffic, deployment of malware, and the creation of botnets. Given the widespread use of Tenda routers in home and small business networks, a large number of devices are potentially vulnerable. The CVSS v3.1 score of 8.8 reflects the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-4960.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/WizardHandle</code> with abnormally long <code>WANT</code> or <code>WANS</code> parameters using the Sigma rule provided below.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect exploit attempts targeting the <code>/goform/WizardHandle</code> endpoint.</li>
<li>Restrict access to the router&rsquo;s web interface from the public internet where possible to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4960</category><category>buffer-overflow</category><category>tenda</category><category>router</category></item><item><title>Tenda AC5 Stack-Based Buffer Overflow Vulnerability (CVE-2026-4903)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-bo/</link><pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-bo/</guid><description>A stack-based buffer overflow vulnerability exists in Tenda AC5 version 15.03.06.47, allowing remote attackers to execute arbitrary code by manipulating the `PPPOEPassword` argument in the `formQuickIndex` function of the `/goform/QuickIndex` component.</description><content:encoded><![CDATA[<p>CVE-2026-4903 describes a critical stack-based buffer overflow vulnerability affecting Tenda AC5 routers, specifically version 15.03.06.47. The vulnerability resides within the <code>formQuickIndex</code> function of the <code>/goform/QuickIndex</code> component, which handles POST requests. An attacker can remotely exploit this vulnerability by crafting a malicious POST request to <code>/goform/QuickIndex</code> with an overly long <code>PPPOEPassword</code> argument. This overflow allows the attacker to potentially overwrite adjacent…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4903</category><category>buffer-overflow</category><category>tenda</category></item><item><title>EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-can-overflow/</link><pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-can-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.</description><content:encoded>&lt;p>EVerest is an open-source software stack for electric vehicle (EV) charging infrastructure. A stack-based buffer overflow vulnerability, tracked as CVE-2026-23995, affects versions prior to 2026.02.0. The vulnerability stems from improper handling of CAN (Controller Area Network) interface names during initialization. Specifically, when an interface name exceeding IFNAMSIZ (16 bytes) is supplied to CAN open routines, the &lt;code>ifreq.ifr_name&lt;/code> buffer overflows, potentially corrupting adjacent stack…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>everest</category><category>buffer-overflow</category><category>cve-2026-23995</category><category>ev-charging</category></item><item><title>Tenda AC5 Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-overflow/</link><pubDate>Fri, 27 Mar 2026 00:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tenda-ac5-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-4905) exists in Tenda AC5 firmware version 15.03.06.47 allowing remote attackers to execute arbitrary code by manipulating the 'index' argument in a POST request to the /goform/WifiWpsOOB endpoint.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-4905, has been discovered in Tenda AC5 home routers running firmware version 15.03.06.47. The vulnerability resides within the <code>formWifiWpsOOB</code> function in the <code>/goform/WifiWpsOOB</code> file, which handles POST requests. Attackers can remotely exploit this flaw by crafting a malicious POST request to this endpoint, specifically targeting the <code>index</code> argument. Successful exploitation leads to arbitrary code execution on the device…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>tenda</category><category>router</category><category>cve-2026-4905</category></item><item><title>EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-overflow/</link><pubDate>Thu, 26 Mar 2026 15:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.</description><content:encoded><![CDATA[<p>EVerest is an open-source software stack for electric vehicle (EV) charging infrastructure. Prior to version 2026.02.0, the IsoMux component contains a vulnerability related to certificate filename handling. Specifically, an off-by-one error occurs when validating the length of certificate filenames. If a filename in the certificate directory equals <code>MAX_FILE_NAME_LENGTH</code> (100 characters), a stack-based buffer overflow can be triggered. A malicious actor could exploit this vulnerability by creating a crafted filename, leading to the corruption of stack state and, potentially, arbitrary code execution. The vulnerability has a CVSS v3.1 score of 8.4 (HIGH). EVerest version 2026.02.0 addresses this issue with a patch.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable EVerest instance running a version prior to 2026.02.0.</li>
<li>The attacker gains access to the certificate directory of the EVerest IsoMux component. The method of access is not specified in the report.</li>
<li>The attacker crafts a malicious filename with a length of 100 characters (MAX_FILE_NAME_LENGTH).</li>
<li>The attacker uploads or creates the crafted file within the certificate directory.</li>
<li>When IsoMux processes the certificate directory, the off-by-one error occurs during filename length validation.</li>
<li>The <code>file_names[idx]</code> buffer overflows, overwriting adjacent stack memory.</li>
<li>The overflow corrupts critical stack data, potentially including return addresses or other function parameters.</li>
<li>Upon function return, the corrupted return address is used, redirecting execution flow to attacker-controlled code, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the EVerest system. This could lead to a compromise of the EV charging infrastructure, potentially disrupting charging services, modifying charging parameters, or gaining unauthorized access to sensitive data related to EV charging operations. Since EVerest is used in EV charging stations, a successful attack could impact multiple charging stations, depending on the deployment architecture, leading to a widespread disruption. The number of affected installations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade EVerest to version 2026.02.0 or later to patch the vulnerability (CVE-2026-22593).</li>
<li>Monitor file creation events within the EVerest certificate directory for filenames with a length of 100 characters using a file_event rule.</li>
<li>Implement strict access controls to the certificate directory to prevent unauthorized file uploads or creation.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts by monitoring process creations related to the Everest software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer overflow</category><category>EV charging</category><category>code execution</category></item><item><title>EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-rce/</link><pubDate>Thu, 26 Mar 2026 15:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-rce/</guid><description>EVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.</description><content:encoded><![CDATA[<p>EVerest is an open-source software stack designed for managing EV charging infrastructure. Prior to version 2026.02.0, a critical vulnerability exists within the <code>HomeplugMessage::setup_payload</code> function. Specifically, the code trusts the <code>len</code> parameter after an <code>assert</code> statement during the processing of SLAC (Signal Level Attenuation Characterization) payloads. In release builds, the <code>assert</code> check is removed, which allows an attacker to send network frames with oversized SLAC payloads. This…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>everest</category><category>rce</category><category>buffer-overflow</category><category>cve-2026-22790</category></item><item><title>Tabs Mail Carrier 2.5.1 MAIL FROM Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-tabs-mail-carrier-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tabs-mail-carrier-overflow/</guid><description>Tabs Mail Carrier 2.5.1 is vulnerable to a buffer overflow in the MAIL FROM SMTP command, allowing remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter with an oversized buffer to overwrite the EIP register and execute a bind shell payload via port 25.</description><content:encoded><![CDATA[<p>Tabs Mail Carrier 2.5.1 is susceptible to a critical buffer overflow vulnerability (CVE-2019-25646) affecting the MAIL FROM SMTP command. This flaw enables unauthenticated remote attackers to execute arbitrary code on the affected system. The vulnerability stems from insufficient bounds checking when processing the MAIL FROM parameter. By sending a specially crafted MAIL FROM command containing an oversized buffer, an attacker can overwrite the EIP register, hijack control flow, and ultimately execute a bind shell payload. This vulnerability can be exploited over the network via port 25 without requiring any prior authentication, making it easily exploitable. Successful exploitation grants the attacker complete control over the vulnerable system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker connects to the target SMTP service on port 25.</li>
<li>The attacker sends a <code>EHLO</code> command to initiate communication with the SMTP server.</li>
<li>The attacker crafts a malicious <code>MAIL FROM</code> command with an oversized buffer.</li>
<li>The attacker sends the crafted <code>MAIL FROM</code> command to the SMTP server.</li>
<li>The oversized buffer overwrites the EIP register in memory.</li>
<li>The overwritten EIP register points to the attacker-controlled shellcode.</li>
<li>The shellcode executes, creating a bind shell on the target system.</li>
<li>The attacker connects to the bind shell and executes arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows remote attackers to execute arbitrary code with the privileges of the Tabs Mail Carrier process. This can lead to complete system compromise, including data theft, modification, or destruction. Given the ease of exploitation and the severity of the impact, this vulnerability poses a significant risk to organizations using the affected software. There is no information on the number of victims or sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SMTP MAIL FROM Buffer Overflow</code> to your SIEM to identify exploitation attempts targeting this vulnerability based on oversized MAIL FROM commands.</li>
<li>Monitor network connections to port 25 for unusual traffic patterns, especially related to long MAIL FROM commands, to detect potential exploitation attempts (network_connection log source).</li>
<li>Consider using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to inspect and filter SMTP traffic for malicious MAIL FROM commands.</li>
<li>Upgrade to a patched version of Tabs Mail Carrier that addresses this vulnerability as soon as it becomes available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2019-25646</category><category>buffer-overflow</category><category>smtp</category><category>code-execution</category></item><item><title>X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-xnetstat-pro-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xnetstat-pro-overflow/</guid><description>X-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.</description><content:encoded>&lt;p>X-NetStat Pro version 5.63 is susceptible to a local buffer overflow vulnerability, identified as CVE-2019-25637. This flaw enables a local attacker to execute arbitrary code on a targeted system. The vulnerability stems from a 264-byte buffer overflow that allows overwriting the EIP register. Successful exploitation allows attackers to inject shellcode into memory, leveraging an egg hunter technique to pinpoint and trigger the malicious payload. The vulnerable functionality resides within the…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>windows</category><category>cve-2019-25637</category></item><item><title>Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)</title><link>https://feed.craftedsignal.io/briefs/2026-03-base64-decoder-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-base64-decoder-overflow/</guid><description>Base64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.</description><content:encoded>&lt;p>Base64 Decoder version 1.1.2 is susceptible to a stack-based buffer overflow vulnerability, identified as CVE-2019-25634. This flaw enables a local attacker to execute arbitrary code on a vulnerable system. The vulnerability arises from insufficient bounds checking when processing input, allowing an attacker to overwrite critical parts of the stack. Successful exploitation requires the attacker to craft a malicious input file specifically designed to trigger the overflow. The impact of this…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25634</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category></item></channel></rss>