<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dhcp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dhcp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 27 Apr 2026 00:20:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dhcp/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DIR-822 A_101 Command Injection via DHCP Hostname</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</link><pubDate>Mon, 27 Apr 2026 00:20:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</guid><description>A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.</description><content:encoded><![CDATA[<p>A command injection vulnerability, tracked as CVE-2026-7067, has been identified in D-Link DIR-822 hardware with firmware version A_101. The vulnerability lies within the udhcpd DHCP service, specifically in the handling of the Hostname argument in the /udhcpcd/dhcpd.c file. A remote attacker can exploit this flaw by injecting arbitrary commands through a crafted Hostname field in a DHCP request. While a proof-of-concept exploit is publicly available, this vulnerability is less impactful because the D-Link DIR-822 A_101 is no longer supported by the vendor, potentially limiting the number of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-822 A_101 device.</li>
<li>The attacker crafts a malicious DHCP request containing a command injection payload in the Hostname field.</li>
<li>The attacker sends the crafted DHCP request to the vulnerable device.</li>
<li>The udhcpd service parses the DHCP request and extracts the Hostname.</li>
<li>Due to insufficient input validation, the injected command within the Hostname is passed to the <code>system</code> function.</li>
<li>The <code>system</code> function executes the injected command with the privileges of the udhcpd process (typically root).</li>
<li>The attacker achieves arbitrary code execution on the device.</li>
<li>The attacker can then perform actions such as gaining persistent access, modifying device configuration, or using the device as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected D-Link DIR-822 A_101 device. Given the end-of-life status of the product, patching is unlikely, leaving devices vulnerable. An attacker could leverage this vulnerability to gain complete control of the router, potentially compromising networks connected to it. The specific number of vulnerable devices is unknown, but the impact could be significant if many devices remain in use.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect command injection attempts via DHCP Hostname (Sigma rule: <code>DHCP Hostname Command Injection</code>).</li>
<li>Monitor network traffic for suspicious DHCP requests containing unusual characters or command sequences in the Hostname field, using network monitoring tools.</li>
<li>Consider network segmentation to isolate potentially vulnerable D-Link DIR-822 A_101 devices from critical network resources.</li>
<li>If replacement is not immediately feasible, implement strict access control lists on the firewall to limit access to the D-Link DIR-822 A_101 device&rsquo;s management interface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>dhcp</category><category>iot</category></item></channel></rss>