<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45373 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45373/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:36:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45373/feed.xml" rel="self" type="application/rss+xml"/><item><title>DeepSeek TUI SSRF Vulnerability via IPv6 Bypass (CVE-2026-45373)</title><link>https://feed.craftedsignal.io/briefs/2026-05-deepseek-tui-ssrf-ipv6-bypass/</link><pubDate>Thu, 14 May 2026 20:36:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-deepseek-tui-ssrf-ipv6-bypass/</guid><description>DeepSeek TUI is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation against IPv6 addresses. When providing an IPv6 address in a URL as `http://[::1]`, the SSRF defenses are bypassed, potentially allowing access to local restricted resources, tracked as CVE-2026-45373.</description><content:encoded><![CDATA[<p>DeepSeek TUI versions prior to 0.8.26 are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. The application&rsquo;s input validation fails to properly sanitize IPv6 addresses provided in URLs, specifically when formatted as <code>http://[::1]</code>. This bypass allows an attacker to potentially circumvent intended access controls and interact with internal or restricted resources that would otherwise be inaccessible from the outside network. This vulnerability allows attackers to potentially read sensitive data or execute commands within the internal network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL containing an IPv6 address in the format <code>http://[::1]</code>.</li>
<li>The attacker inputs this URL into the DeepSeek TUI, specifically targeting the <code>fetch_url</code> tool.</li>
<li>The <code>fetch_url</code> tool in <code>src/tools/fetch_url.rs</code> attempts to process the provided URL.</li>
<li>The application&rsquo;s SSRF defenses fail to properly validate the IPv6 address <code>[::1]</code>.</li>
<li>The application initiates a request to the specified IPv6 address (localhost).</li>
<li>The request is routed to a local service or resource on the server.</li>
<li>The attacker gains access to the content or functionality of the local resource.</li>
<li>The attacker can potentially read sensitive information or perform actions within the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-45373) can lead to unauthorized access to internal resources and sensitive information. Attackers could potentially read configuration files, access internal APIs, or even execute arbitrary commands on the server, depending on the accessible local resources. The specific impact depends on the configuration and services running on the targeted host.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade DeepSeek TUI to version 0.8.26 or later to remediate CVE-2026-45373.</li>
<li>Deploy the Sigma rule <code>Detect DeepSeek TUI SSRF Attempt via IPv6 Bypass</code> to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-45373</category><category>deepseek-tui</category></item></channel></rss>