<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5844 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5844/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 05:16:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5844/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DIR-882 Remote Command Injection Vulnerability (CVE-2026-5844)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</link><pubDate>Thu, 09 Apr 2026 05:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-command-injection/</guid><description>A command injection vulnerability (CVE-2026-5844) exists in the D-Link DIR-882 router version 1.01B02, allowing a remote attacker to execute arbitrary OS commands by manipulating the IPAddress argument in the HNAP1 SetNetworkSettings Handler via the prog.cgi script.</description><content:encoded><![CDATA[<p>CVE-2026-5844 describes a critical command injection vulnerability affecting D-Link DIR-882 routers running firmware version 1.01B02. The vulnerability resides in the <code>sprintf</code> function within the <code>prog.cgi</code> script, specifically within the HNAP1 SetNetworkSettings Handler. A remote, unauthenticated attacker can exploit this flaw by manipulating the <code>IPAddress</code> argument, injecting arbitrary OS commands that are then executed with elevated privileges. The vulnerability is considered critical due to the potential for complete system compromise and the availability of a public exploit. This vulnerability impacts products that are no longer supported by the maintainer, increasing the risk for users who have not migrated to newer devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-882 router running firmware version 1.01B02.</li>
<li>The attacker sends a crafted HTTP request to the <code>prog.cgi</code> endpoint.</li>
<li>The HTTP request targets the HNAP1 SetNetworkSettings Handler.</li>
<li>The attacker manipulates the <code>IPAddress</code> argument within the HTTP request, injecting malicious OS commands.</li>
<li>The <code>sprintf</code> function in <code>prog.cgi</code> processes the attacker-controlled <code>IPAddress</code> argument without proper sanitization.</li>
<li>The injected OS commands are executed on the router&rsquo;s operating system due to the command injection vulnerability in <code>sprintf</code>.</li>
<li>The attacker gains remote code execution on the router.</li>
<li>The attacker can then perform actions such as modifying router settings, eavesdropping on network traffic, or using the router as a botnet node.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5844 allows a remote attacker to execute arbitrary OS commands on the vulnerable D-Link DIR-882 router. This can lead to a complete compromise of the device, enabling attackers to reconfigure the router, intercept network traffic, or use the compromised device as part of a botnet. The vulnerability affects end-of-life products, meaning no official patches are available. The impact is significant due to the widespread use of these routers in home and small business networks, where they can act as a gateway to internal systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect D-Link DIR-882 Command Injection Attempt</code> to detect suspicious requests to <code>prog.cgi</code> containing shell metacharacters.</li>
<li>Block access to the URL <code>https://files.catbox.moe/ei31k1.zip</code> to prevent the download of the publicly available exploit (IOC).</li>
<li>Monitor web server logs for HTTP requests to <code>prog.cgi</code> with unusually long <code>IPAddress</code> parameters (log source: webserver).</li>
<li>Implement network intrusion detection systems (IDS) rules to identify and block exploit attempts targeting CVE-2026-5844 (log source: network_connection).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>d-link</category><category>router</category><category>cve-2026-5844</category></item></channel></rss>