<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Disclosure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-disclosure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 13:16:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-disclosure/feed.xml" rel="self" type="application/rss+xml"/><item><title>Across DR-810 Unauthenticated File Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-across-dr810-file-disclosure/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-across-dr810-file-disclosure/</guid><description>Across DR-810 routers are vulnerable to unauthenticated file disclosure, allowing remote attackers to download the rom-0 backup file containing sensitive information, such as router passwords and configuration data, via a simple GET request to the rom-0 endpoint.</description><content:encoded><![CDATA[<p>The Across DR-810 router contains an unauthenticated file disclosure vulnerability (CVE-2019-25706) that allows remote attackers to retrieve sensitive information. By sending a simple GET request to the <code>/rom-0</code> endpoint, an attacker can download a backup file containing router passwords, configuration details, and potentially other sensitive data. This vulnerability exists because the <code>/rom-0</code> endpoint does not require authentication, allowing anyone with network access to the router to retrieve the backup file. Successful exploitation leads to complete compromise of the device&rsquo;s configuration and potential lateral movement within the network if credentials are reused. This vulnerability was published on 2026-04-12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Across DR-810 router exposed on the network.</li>
<li>Attacker crafts an HTTP GET request targeting the <code>/rom-0</code> endpoint.</li>
<li>The router responds with the <code>rom-0</code> backup file without requiring authentication.</li>
<li>Attacker downloads the <code>rom-0</code> backup file.</li>
<li>Attacker decompresses the downloaded <code>rom-0</code> file, which is likely compressed to reduce size.</li>
<li>The attacker parses the decompressed file to extract sensitive information such as router passwords.</li>
<li>Attacker uses the extracted router passwords to gain administrative access to the router&rsquo;s web interface.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to retrieve sensitive information, including router passwords and configuration data. This can lead to complete compromise of the affected router. An attacker can then modify router settings, intercept network traffic, or potentially use the compromised router as a pivot point to access other systems on the network. If the router passwords are reused across multiple systems, the impact could extend beyond the compromised router, affecting other devices and services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to the <code>/rom-0</code> endpoint on Across DR-810 routers to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Inspect network traffic for unusual downloads from Across DR-810 routers, focusing on responses from the <code>/rom-0</code> endpoint.</li>
<li>Block access to the <code>/rom-0</code> endpoint on Across DR-810 routers via firewall rules to prevent unauthorized access.</li>
<li>Review the provided reference URLs for additional context and potential mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2019-25706</category><category>file-disclosure</category><category>router</category><category>network</category></item></channel></rss>