<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6992 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6992/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 26 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6992/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linksys MR9600 Command Injection Vulnerability (CVE-2026-6992)</title><link>https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</link><pubDate>Sun, 26 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-linksys-rce/</guid><description>CVE-2026-6992 is a command injection vulnerability in the Linksys MR9600 router that allows remote attackers to execute arbitrary OS commands by manipulating the 'pin' argument in the BTRequestGetSmartConnectStatus function.</description><content:encoded><![CDATA[<p>A command injection vulnerability, CVE-2026-6992, affects the Linksys MR9600 router, specifically version 2.0.6.206937. The vulnerability resides in the JNAP Action Handler component within the <code>/etc/init.d/run_central2.sh</code> script. Attackers can remotely exploit this flaw by manipulating the <code>pin</code> argument passed to the <code>BTRequestGetSmartConnectStatus</code> function. This allows for the execution of arbitrary operating system commands on the affected device. A public exploit is available, increasing the risk of exploitation. The vendor was notified but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the Linksys MR9600 router.</li>
<li>The request targets the JNAP Action Handler component, specifically the <code>/etc/init.d/run_central2.sh</code> script.</li>
<li>The <code>BTRequestGetSmartConnectStatus</code> function is invoked by the crafted request.</li>
<li>The attacker injects malicious OS commands within the <code>pin</code> argument of the <code>BTRequestGetSmartConnectStatus</code> function.</li>
<li>The router&rsquo;s firmware processes the request, failing to properly sanitize the <code>pin</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the running process, potentially <code>root</code>.</li>
<li>The attacker gains control of the router, potentially allowing for further malicious activities, such as network traffic interception or modification of router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6992 allows a remote attacker to execute arbitrary commands on the Linksys MR9600 router. This can lead to a complete compromise of the device, allowing the attacker to monitor network traffic, change router configurations, or use the router as a foothold for further attacks within the network. Given the availability of a public exploit, the risk of widespread exploitation is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2026-6992 Exploitation Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Apply the Sigma rule <code>Detect Suspicious Shell Activity via Web Request</code> to detect potential command injection attempts.</li>
<li>Monitor web server logs for requests containing suspicious characters in the <code>cs-uri-query</code> field that target <code>/etc/init.d/run_central2.sh</code> to uncover exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6992</category><category>command-injection</category><category>router</category><category>rce</category></item></channel></rss>