<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-7833 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7833/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 13:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7833/feed.xml" rel="self" type="application/rss+xml"/><item><title>EFM ipTIME C200 Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-iptime-c200-cmd-injection/</link><pubDate>Tue, 05 May 2026 13:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-iptime-c200-cmd-injection/</guid><description>EFM ipTIME C200 devices are vulnerable to remote command injection due to insufficient validation of the RestoreFile argument in the /cgi/iux_set.cgi endpoint, allowing attackers to execute arbitrary commands with elevated privileges.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, CVE-2026-7833, affects EFM ipTIME C200 devices up to version 1.092. The vulnerability resides within the <code>sub_408F90</code> function of the <code>/cgi/iux_set.cgi</code> file, specifically the ApplyRestore Endpoint. By manipulating the <code>RestoreFile</code> argument, an attacker can inject arbitrary commands that will be executed on the device. The vulnerability can be exploited remotely and proof-of-concept exploit code is publicly available. The vendor was notified but did not respond, increasing the risk to users of these devices. This vulnerability allows for complete system compromise of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP POST request to <code>/cgi/iux_set.cgi</code>.</li>
<li>The request includes the <code>RestoreFile</code> argument containing a command injection payload within the <code>ApplyRestore</code> endpoint.</li>
<li>The <code>sub_408F90</code> function processes the <code>RestoreFile</code> argument without proper sanitization.</li>
<li>The injected command is executed with the privileges of the webserver process.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
<li>The attacker pivots to internal network if the device acts as a gateway.</li>
<li>The attacker may install persistent backdoors or malware.</li>
<li>The attacker could exfiltrate sensitive information or disrupt device operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7833 allows a remote attacker to execute arbitrary commands on the EFM ipTIME C200 device. This could lead to complete compromise of the device, including unauthorized access to the device&rsquo;s configuration, data, and network. Given the device&rsquo;s role as a network gateway, successful exploitation could also allow the attacker to pivot to other devices on the internal network. The lack of vendor response exacerbates the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply network access control lists to restrict access to the <code>/cgi/iux_set.cgi</code> endpoint from untrusted networks.</li>
<li>Monitor web server logs for suspicious POST requests targeting the <code>/cgi/iux_set.cgi</code> endpoint with unusual <code>RestoreFile</code> arguments. Deploy the Sigma rule to detect command injection attempts.</li>
<li>Utilize vulnerability scanning tools to identify potentially vulnerable EFM ipTIME C200 devices on the network.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>command injection</category><category>iot</category><category>cve-2026-7833</category></item></channel></rss>