<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-5573 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5573/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 05 Apr 2026 15:16:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5573/feed.xml" rel="self" type="application/rss+xml"/><item><title>Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)</title><link>https://feed.craftedsignal.io/briefs/2026-04-technostrobe-upload/</link><pubDate>Sun, 05 Apr 2026 15:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-technostrobe-upload/</guid><description>CVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5573, has been identified in Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30. This flaw allows unauthenticated, remote attackers to upload arbitrary files to the device due to improper handling of the &lsquo;cwd&rsquo; argument when accessing the <code>/fs</code> file. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat due to the potential for complete system compromise, including remote code execution and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Technostrobe HI-LED-WR120-G2 device running the vulnerable firmware version 5.5.0.1R6.03.30.</li>
<li>The attacker sends a crafted HTTP request to the <code>/fs</code> endpoint, manipulating the <code>cwd</code> argument.</li>
<li>The manipulated <code>cwd</code> argument bypasses access controls, allowing the attacker to specify an arbitrary upload directory.</li>
<li>The attacker uploads a malicious file, such as a web shell or executable, to the specified directory.</li>
<li>The attacker accesses the uploaded file via a web browser or other means.</li>
<li>If the uploaded file is executable (e.g., a web shell), the attacker executes arbitrary commands on the device with the privileges of the web server.</li>
<li>The attacker leverages the gained access to escalate privileges, install persistent backdoors, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5573 allows attackers to gain complete control over affected Technostrobe HI-LED-WR120-G2 devices. This can lead to data breaches, system disruption, or the device being used as a foothold for further attacks within the network. The lack of vendor response and the availability of public exploits make this vulnerability particularly dangerous.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests to the <code>/fs</code> endpoint with unusual <code>cwd</code> parameter values. Use the provided Sigma rule to detect such activity.</li>
<li>Inspect uploaded files for malicious content. Deploy the file upload detection Sigma rule to identify potential web shells.</li>
<li>Block connections to the identified malicious URLs to prevent exploit attempts (see IOCs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-5573</category><category>file-upload</category><category>web-application</category></item></channel></rss>