<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Hardware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/hardware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/hardware/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linksys E1200 Authenticated Stack Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2024-01-linksys-e1200-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linksys-e1200-rce/</guid><description>A stack buffer overflow vulnerability in Linksys E1200 firmware version 2.0.04 and earlier allows an authenticated attacker to achieve remote code execution by sending a crafted HTTP POST request to the apply.cgi endpoint.</description><content:encoded><![CDATA[<p>The Linksys E1200 router, specifically firmware version 2.0.04 and earlier, is susceptible to an authenticated stack buffer overflow vulnerability (CVE-2025-60690). The vulnerability resides in the handling of the lan_ipaddr parameters within the apply.cgi endpoint. Exploitation requires the attacker to be authenticated and directly connected to the LAN. Successful exploitation allows an attacker to execute arbitrary code on the device, potentially leading to full system compromise. The exploit leverages a buffer overflow in the handling of the &rsquo;lan_ipaddr&rsquo; parameters within the apply.cgi script. This vulnerability poses a significant risk to home and small business networks using the affected Linksys E1200 router.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the LAN network where the Linksys E1200 is connected.</li>
<li>The attacker authenticates to the Linksys E1200 web interface using valid credentials (e.g., admin:admin).</li>
<li>The attacker crafts an HTTP POST request targeting the <code>/apply.cgi</code> endpoint.</li>
<li>The POST request includes the <code>action=Apply</code> parameter and excessively long <code>lan_ipaddr_*</code> parameters designed to overflow a stack buffer.</li>
<li>The attacker injects shellcode into the overflowing buffer within the crafted <code>lan_ipaddr_3</code> parameter. The shellcode payload constructs a reverse shell.</li>
<li>The router&rsquo;s web server (<code>httpd</code>) processes the malicious POST request and attempts to write the oversized input into the stack buffer, triggering the overflow.</li>
<li>The injected shellcode is executed, establishing a reverse shell connection back to the attacker&rsquo;s machine.</li>
<li>The attacker gains remote code execution on the Linksys E1200 router, allowing for arbitrary command execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control of the affected Linksys E1200 router. This can lead to a variety of malicious activities, including eavesdropping on network traffic, modifying router configurations (DNS settings, firewall rules), and using the compromised router as a pivot point for further attacks within the local network. Given the widespread use of Linksys E1200 routers in homes and small businesses, this vulnerability has the potential to impact a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available firmware updates from Linksys to patch CVE-2025-60690 when they become available.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/apply.cgi</code> with abnormally long <code>lan_ipaddr_*</code> parameters using the Sigma rule provided.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other network devices.</li>
<li>Enforce strong and unique passwords for all router accounts to prevent unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>rce</category><category>hardware</category></item></channel></rss>