<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-22563 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-22563/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 13 Apr 2026 22:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-22563/feed.xml" rel="self" type="application/rss+xml"/><item><title>UniFi Play Command Injection Vulnerability (CVE-2026-22563)</title><link>https://feed.craftedsignal.io/briefs/2026-04-unifi-command-injection/</link><pubDate>Mon, 13 Apr 2026 22:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unifi-command-injection/</guid><description>A malicious actor with access to the UniFi Play network can exploit improper input validation vulnerabilities (CVE-2026-22563) in UniFi Play PowerAmp and Audio Port to inject commands, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-22563 describes a critical command injection vulnerability affecting UniFi Play PowerAmp (version 1.0.35 and earlier) and UniFi Play Audio Port (version 1.0.24 and earlier). The vulnerability stems from improper input validation, which allows an attacker with access to the UniFi Play network to inject arbitrary commands. Successful exploitation could lead to unauthorized access, system compromise, and potentially full control of the affected devices. This vulnerability was reported to HackerOne and assigned a CVSS v3.1 score of 9.8, indicating its severity. It is crucial for organizations using these UniFi Play devices to apply the recommended updates to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains access to the UniFi Play network (e.g., through compromised credentials or network vulnerabilities).</li>
<li>Attacker identifies a vulnerable UniFi Play PowerAmp or Audio Port device running an affected software version (1.0.35 or earlier for PowerAmp, 1.0.24 or earlier for Audio Port).</li>
<li>Attacker crafts a malicious payload containing an injected command.</li>
<li>Attacker sends the malicious payload to the vulnerable device through a network request, exploiting the improper input validation vulnerability (CVE-2026-22563).</li>
<li>The vulnerable device fails to properly sanitize the input, allowing the injected command to be executed by the underlying operating system.</li>
<li>The injected command executes with the privileges of the UniFi Play application, potentially allowing the attacker to perform actions such as reading sensitive data, modifying system configurations, or installing malicious software.</li>
<li>Attacker establishes a reverse shell to maintain persistent access to the compromised device.</li>
<li>Attacker pivots to other devices in the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22563 can lead to full system compromise of UniFi Play PowerAmp and Audio Port devices. An attacker could gain unauthorized access to sensitive data, disrupt audio services, or use the compromised devices as a foothold to pivot to other systems on the network. Given the high CVSS score of 9.8, the impact is considered critical. The specific number of affected devices and sectors remains unknown, but organizations utilizing UniFi Play devices are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later to patch CVE-2026-22563.</li>
<li>Monitor network traffic for suspicious activity originating from UniFi Play devices.</li>
<li>Implement network segmentation to limit the potential impact of a compromised device.</li>
<li>Review and enforce strong password policies to prevent unauthorized network access.</li>
<li>Deploy the Sigma rule for command injection attempts targeting UniFi Play devices (see below) to detect exploitation attempts in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>unifi</category><category>cve-2026-22563</category></item></channel></rss>