<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4910 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4910/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 04:16:08 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4910/feed.xml" rel="self" type="application/rss+xml"/><item><title>Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-streamax-sql-injection/</link><pubDate>Fri, 27 Mar 2026 04:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-streamax-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-4910, affects Shenzhen Ruiming Technology Streamax Crocus bis version 1.3.44. The vulnerability is located within the <code>/RemoteFormat.do</code> file, specifically the <code>Endpoint</code> component. By manipulating the <code>State</code> argument, a remote attacker can inject arbitrary SQL commands. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but did not respond. Successful exploitation could lead to unauthorized data…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4910</category><category>sql-injection</category><category>streamax</category><category>webserver</category></item></channel></rss>