<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Iot — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/iot/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 00:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/iot/feed.xml" rel="self" type="application/rss+xml"/><item><title>UTT HiPER 1200GW Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</link><pubDate>Fri, 01 May 2026 00:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in UTT HiPER 1200GW devices up to version 2.5.3-170306, stemming from manipulation of the `strcpy` function in the `/goform/formRemoteControl` file, which allows remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability has been identified in UTT HiPER 1200GW devices with firmware versions up to 2.5.3-170306. The flaw resides within the <code>strcpy</code> function of the <code>/goform/formRemoteControl</code> file, which handles remote control functionalities. A remote attacker can exploit this vulnerability by sending a specially crafted request to trigger the buffer overflow, potentially leading to arbitrary code execution on the affected device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to organizations using the affected UTT HiPER 1200GW devices, as it could allow attackers to gain unauthorized access and control over the device and potentially the network it is connected to.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable UTT HiPER 1200GW device exposed to the internet.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/goform/formRemoteControl</code> endpoint.</li>
<li>The malicious request includes a payload designed to overflow the buffer when processed by the <code>strcpy</code> function.</li>
<li>The vulnerable <code>strcpy</code> function within <code>/goform/formRemoteControl</code> copies the attacker-controlled data without proper bounds checking.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>The attacker leverages the overflow to inject and execute arbitrary code on the device.</li>
<li>The attacker gains control of the device, potentially escalating privileges.</li>
<li>The attacker uses the compromised device to pivot to other systems on the network, exfiltrate sensitive data, or cause further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to complete compromise of the affected UTT HiPER 1200GW device. Attackers could gain unauthorized access to sensitive data, disrupt device functionality, or use the device as a foothold for further attacks within the network. Given that public exploits are available, the risk of widespread exploitation is high. While the exact number of affected devices is unknown, organizations using UTT HiPER 1200GW devices should take immediate action to mitigate this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from UTT to address the buffer overflow vulnerability in UTT HiPER 1200GW devices.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/goform/formRemoteControl</code> endpoint, and deploy the Sigma rule <code>Detect Suspicious Requests to FormRemoteControl</code> to identify potentially malicious activity.</li>
<li>Implement input validation and sanitization measures to prevent buffer overflows in web applications.</li>
<li>Consider network segmentation to limit the impact of a compromised device on other systems within the network.</li>
<li>Review and restrict access to the device&rsquo;s web interface to only authorized personnel.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve</category></item><item><title>UTT HiPER 1250GW Buffer Overflow Vulnerability (CVE-2026-7420)</title><link>https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-utt-hiper-buffer-overflow/</guid><description>A buffer overflow vulnerability in UTT HiPER 1250GW devices (versions up to 3.2.7-210907-180535) allows remote attackers to execute arbitrary code by manipulating the 'Profile' argument in the `strcpy` function of the `route/goform/ConfigAdvideo` file, due to insufficient bounds checking.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, CVE-2026-7420, has been identified in UTT HiPER 1250GW devices. The vulnerability exists in versions up to 3.2.7-210907-180535. The vulnerability lies within the <code>strcpy</code> function in the <code>route/goform/ConfigAdvideo</code> file, where the &lsquo;Profile&rsquo; argument is not properly validated, leading to a buffer overflow condition. This allows unauthenticated remote attackers to potentially execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of exploitation. Defenders should implement mitigations and detection strategies immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable UTT HiPER 1250GW device exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>route/goform/ConfigAdvideo</code> endpoint.</li>
<li>The HTTP request includes a &lsquo;Profile&rsquo; argument with a payload exceeding the buffer size allocated for it.</li>
<li>The <code>strcpy</code> function attempts to copy the oversized &lsquo;Profile&rsquo; argument into the undersized buffer.</li>
<li>The buffer overflow occurs, overwriting adjacent memory regions.</li>
<li>The attacker injects malicious code into the overflowed memory region to gain code execution.</li>
<li>The attacker achieves remote code execution on the UTT HiPER 1250GW device.</li>
<li>The attacker gains control of the device, potentially using it for further malicious activities such as lateral movement, data exfiltration, or denial-of-service attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the UTT HiPER 1250GW device. This can lead to complete compromise of the device, potentially enabling attackers to gain unauthorized access to the network it is connected to, exfiltrate sensitive data, or use the device as a bot in a botnet. The impact is significant, especially if these devices are used in critical infrastructure or sensitive environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates for UTT HiPER 1250GW devices to remediate CVE-2026-7420.</li>
<li>Implement network segmentation to isolate UTT HiPER 1250GW devices from critical network segments.</li>
<li>Deploy the Sigma rule <code>Detect UTT HiPER Buffer Overflow Attempt</code> to identify malicious HTTP requests targeting the <code>route/goform/ConfigAdvideo</code> endpoint.</li>
<li>Monitor web server logs for unusual activity and large &lsquo;Profile&rsquo; argument values in requests to <code>route/goform/ConfigAdvideo</code> to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>iot</category></item><item><title>Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-n300rt-bo/</link><pubDate>Tue, 28 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-n300rt-bo/</guid><description>A remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-7219, has been discovered in Totolink N300RT router firmware version 3.4.0-B20250430. The vulnerability resides within the <code>/boafrm/formIpQoS</code> file and is triggered by manipulating the <code>entry_name</code> argument. An attacker can exploit this flaw remotely to potentially execute arbitrary code on the device. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability poses a significant threat to devices running the affected firmware, potentially allowing attackers to gain unauthorized access and control over the router.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Totolink N300RT device running firmware version 3.4.0-B20250430.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boafrm/formIpQoS</code> file.</li>
<li>The crafted request includes a payload designed to overflow the buffer associated with the <code>entry_name</code> argument.</li>
<li>The router&rsquo;s web server processes the malicious request, leading to a buffer overflow condition.</li>
<li>The attacker overwrites adjacent memory regions, potentially including return addresses or other critical data.</li>
<li>Upon function return, the overwritten return address is used, diverting execution flow to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution on the device.</li>
<li>The attacker can then use this access to modify router settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Totolink N300RT device. This could lead to complete compromise of the router, enabling attackers to monitor network traffic, change DNS settings, or use the device as part of a botnet. Given the number of Totolink N300RT devices deployed, this vulnerability could have a widespread impact, especially for home and small business users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests targeting <code>/boafrm/formIpQoS</code> with unusually long <code>entry_name</code> parameters to detect potential exploitation attempts. Implement the Sigma rule <code>Detect Suspicious Totolink FormIpQoS Requests</code>.</li>
<li>Apply firmware updates as soon as they are released by Totolink to patch CVE-2026-7219.</li>
<li>Implement network segmentation to limit the impact of a compromised router on other devices on the network.</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests targeting the router&rsquo;s web interface and activate the <code>Detect Large POST Requests to Router Config Pages</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>iot</category><category>router</category><category>cve-2026-7219</category></item><item><title>D-Link DIR-822 A_101 Command Injection via DHCP Hostname</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</link><pubDate>Mon, 27 Apr 2026 00:20:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-dir822-cmd-injection/</guid><description>A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.</description><content:encoded><![CDATA[<p>A command injection vulnerability, tracked as CVE-2026-7067, has been identified in D-Link DIR-822 hardware with firmware version A_101. The vulnerability lies within the udhcpd DHCP service, specifically in the handling of the Hostname argument in the /udhcpcd/dhcpd.c file. A remote attacker can exploit this flaw by injecting arbitrary commands through a crafted Hostname field in a DHCP request. While a proof-of-concept exploit is publicly available, this vulnerability is less impactful because the D-Link DIR-822 A_101 is no longer supported by the vendor, potentially limiting the number of affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable D-Link DIR-822 A_101 device.</li>
<li>The attacker crafts a malicious DHCP request containing a command injection payload in the Hostname field.</li>
<li>The attacker sends the crafted DHCP request to the vulnerable device.</li>
<li>The udhcpd service parses the DHCP request and extracts the Hostname.</li>
<li>Due to insufficient input validation, the injected command within the Hostname is passed to the <code>system</code> function.</li>
<li>The <code>system</code> function executes the injected command with the privileges of the udhcpd process (typically root).</li>
<li>The attacker achieves arbitrary code execution on the device.</li>
<li>The attacker can then perform actions such as gaining persistent access, modifying device configuration, or using the device as part of a botnet.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on the affected D-Link DIR-822 A_101 device. Given the end-of-life status of the product, patching is unlikely, leaving devices vulnerable. An attacker could leverage this vulnerability to gain complete control of the router, potentially compromising networks connected to it. The specific number of vulnerable devices is unknown, but the impact could be significant if many devices remain in use.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect command injection attempts via DHCP Hostname (Sigma rule: <code>DHCP Hostname Command Injection</code>).</li>
<li>Monitor network traffic for suspicious DHCP requests containing unusual characters or command sequences in the Hostname field, using network monitoring tools.</li>
<li>Consider network segmentation to isolate potentially vulnerable D-Link DIR-822 A_101 devices from critical network resources.</li>
<li>If replacement is not immediately feasible, implement strict access control lists on the firewall to limit access to the D-Link DIR-822 A_101 device&rsquo;s management interface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>dhcp</category><category>iot</category></item><item><title>Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</link><pubDate>Sat, 25 Apr 2026 18:18:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-hg10-bo/</guid><description>A buffer overflow vulnerability in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon allows remote attackers to execute arbitrary code by manipulating the nextHop argument in the formRoute function of the /boaform/formRouting file, impacting device availability and integrity.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, identified as CVE-2026-6988, has been discovered in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. The vulnerability resides within the Boa Service, specifically affecting the <code>formRoute</code> function located in the <code>/boaform/formRouting</code> file. Successful exploitation of this flaw enables a remote attacker to overwrite memory by crafting a malicious request with a manipulated <code>nextHop</code> argument. This can lead to arbitrary code execution on the affected device. Given the potential for remote exploitation and the availability of a published exploit, this vulnerability poses a significant threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device with the vulnerable Boa web service exposed.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/boaform/formRouting</code> endpoint.</li>
<li>The crafted request includes a specially crafted <code>nextHop</code> argument, exceeding the buffer size allocated for it.</li>
<li>The Boa service processes the request without proper bounds checking on the <code>nextHop</code> argument.</li>
<li>The oversized <code>nextHop</code> argument overwrites adjacent memory regions, including critical program data or return addresses.</li>
<li>The overwritten return address redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code on the device with the privileges of the Boa service.</li>
<li>The attacker gains control of the device, potentially leading to data exfiltration, device hijacking, or further network compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6988 can lead to complete compromise of the affected Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon device. This may result in unauthorized access to the device&rsquo;s configuration, sensitive data exposure, or the device being used as a bot in a larger attack. Given that this device is likely used in home or small business environments, a successful attack could lead to significant data breaches, financial losses, and reputational damage. The availability of a public exploit increases the likelihood of widespread exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates released by Tenda to address CVE-2026-6988 as soon as possible.</li>
<li>Implement network segmentation to limit the exposure of Tenda devices to the internet or untrusted networks.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/boaform/formRouting</code> endpoint to detect potential exploit attempts (webserver log source).</li>
<li>Deploy the Sigma rule &ldquo;Detect Tenda HG10 Buffer Overflow Attempt&rdquo; to identify malicious HTTP requests exploiting the <code>nextHop</code> argument (Sigma rule).</li>
<li>Implement rate limiting on the <code>/boaform/formRouting</code> endpoint to mitigate potential brute-force exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>cve-2026-6988</category><category>tenda</category><category>iot</category></item><item><title>Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirai-dlink-rce/</guid><description>A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.</description><content:encoded><![CDATA[<p>A new Mirai-based malware campaign has been observed exploiting CVE-2025-29635, a high-severity command injection vulnerability affecting D-Link DIR-823X routers. Discovered by Akamai&rsquo;s SIRT in March 2026, the campaign involves attackers sending malicious POST requests to vulnerable D-Link routers to execute arbitrary commands. This vulnerability allows attackers to download and execute a shell script, ultimately leading to the deployment of Mirai-based malware. The affected D-Link routers reached end-of-life in November 2024, meaning a patch is unlikely. The same actor is also exploiting CVE-2023-1389 impacting TP-Link routers, and an RCE flaw in ZTE ZXV10 H108L routers, deploying the same Mirai payload.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a POST request to the <code>/goform/set_prohibiting</code> endpoint on the D-Link DIR-823X router.</li>
<li>The POST request exploits CVE-2025-29635 to inject and execute arbitrary commands.</li>
<li>The injected commands change directories across writable paths on the router.</li>
<li>A shell script named <code>dlink.sh</code> is downloaded from an external IP address.</li>
<li>The <code>dlink.sh</code> script is executed on the compromised router.</li>
<li>The script installs a Mirai-based malware variant named &ldquo;tuxnokill&rdquo;.</li>
<li>&ldquo;tuxnokill&rdquo; establishes persistence and begins scanning for new targets.</li>
<li>The compromised device is then used to launch DDoS attacks, leveraging Mirai&rsquo;s standard capabilities, including TCP SYN/ACK/STOMP, UDP floods, and HTTP null attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-29635 allows attackers to remotely execute arbitrary commands on vulnerable D-Link DIR-823X routers. The compromised routers are then incorporated into the Mirai botnet, increasing its size and DDoS capabilities. Given that these routers are end-of-life, many remain unpatched, potentially leading to a large number of compromised devices. This can result in network disruptions and service outages for targeted entities, as well as potential data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for POST requests to the <code>/goform/set_prohibiting</code> endpoint on D-Link routers, as described in the Attack Chain, to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Mirai dlink.sh Download</code> to identify attempts to download the malicious shell script.</li>
<li>If using affected D-Link DIR-823X routers, TP-Link, or ZTE ZXV10 H108L routers, upgrade to a supported device or implement network segmentation to limit potential damage.</li>
<li>Block the external IP address hosting the <code>dlink.sh</code> script if it can be reliably determined and is observed on your network.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>mirai</category><category>ddos</category><category>rce</category><category>iot</category></item><item><title>Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-auth-bypass/</link><pubDate>Fri, 17 Apr 2026 20:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-auth-bypass/</guid><description>Anviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.</description><content:encoded><![CDATA[<p>CVE-2026-40461 describes a vulnerability affecting Anviz CX2 Lite and CX7 devices. The vulnerability allows unauthenticated attackers to send POST requests that modify debug settings on the devices. A successful exploit can enable features like SSH, which are normally restricted. This unauthorized configuration change could be leveraged to gain unauthorized access to the device and potentially the network it is connected to, allowing for further malicious activity. The vulnerability was disclosed in April 2026 and poses a significant risk to organizations using the affected Anviz devices for access control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Anviz CX2 Lite or CX7 device on the network.</li>
<li>The attacker sends an unauthenticated POST request to the device&rsquo;s web interface.</li>
<li>The POST request targets a specific endpoint responsible for modifying debug settings.</li>
<li>The request includes parameters that enable debug features, such as SSH.</li>
<li>The device improperly processes the request without requiring authentication, modifying the debug settings accordingly.</li>
<li>The attacker uses the newly enabled SSH service to gain shell access to the device.</li>
<li>The attacker leverages the gained access to escalate privileges, move laterally within the network, or exfiltrate sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40461 allows an attacker to modify device settings, potentially enabling unauthorized access and control over Anviz CX2 Lite and CX7 devices. This can lead to a compromise of the physical security system and potentially the entire network. The impact includes unauthorized entry, data breaches, and disruption of operations. The number of affected devices and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for POST requests targeting Anviz CX2 Lite and CX7 devices attempting to modify debug settings. Deploy the Sigma rule <code>Detect Anviz Debug Setting Modification</code> to identify such activity.</li>
<li>Implement network segmentation to isolate Anviz devices from critical network resources to limit the impact of a potential compromise.</li>
<li>Consult the vendor&rsquo;s website (<a href="https://www.anviz.com/contact-us.html">https://www.anviz.com/contact-us.html</a>) and CISA advisory (<a href="https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-03">https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-03</a>) for any available patches or mitigations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40461</category><category>authentication-bypass</category><category>iot</category></item><item><title>Anviz CX2 Lite Authenticated Command Injection Vulnerability (CVE-2026-35682)</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-command-injection/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-command-injection/</guid><description>Anviz CX2 Lite is vulnerable to an authenticated command injection via the filename parameter, leading to arbitrary command execution and root-level access.</description><content:encoded><![CDATA[<p>CVE-2026-35682 describes an authenticated command injection vulnerability in Anviz CX2 Lite devices. An attacker with valid user credentials can inject arbitrary commands into the filename parameter, leading to remote code execution with root privileges. The vulnerability allows an attacker to execute commands like starting telnetd, effectively gaining complete control over the device. This poses a significant risk to organizations using vulnerable Anviz CX2 Lite devices for access control or time attendance, potentially leading to unauthorized access, data breaches, or denial-of-service conditions. The ICS-CERT advisory, ICSA-26-106-03, provides additional details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for an Anviz CX2 Lite device.</li>
<li>The attacker authenticates to the device&rsquo;s web interface or API.</li>
<li>The attacker identifies the vulnerable filename parameter in a specific request.</li>
<li>The attacker crafts a malicious request containing a command injection payload within the filename parameter (e.g., <code>filename=;telnetd -p 1337 -l /bin/sh;</code>).</li>
<li>The Anviz CX2 Lite device processes the request, improperly sanitizing the filename parameter.</li>
<li>The injected command executes with root privileges on the device.</li>
<li>The attacker uses the executed command to start a service like telnetd.</li>
<li>The attacker connects to the newly started service, gaining a root shell and complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35682 allows a remote attacker to gain root-level access to the Anviz CX2 Lite device. This can lead to complete system compromise, including unauthorized access to sensitive data, modification of device settings, and potential use of the device as a foothold for further attacks within the network. Given that these devices are often used for physical access control, this vulnerability could lead to unauthorized physical access to secured areas.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or firmware updates from Anviz to remediate CVE-2026-35682. Contact Anviz directly through their website for support and remediation steps (<a href="https://www.anviz.com/contact-us.html)">https://www.anviz.com/contact-us.html)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Anviz CX2 Lite Command Injection Attempt</code> to identify exploitation attempts against the device.</li>
<li>Monitor web server logs for suspicious requests containing command injection payloads in the filename parameter to identify potential exploitation attempts.</li>
<li>Review authentication logs for unauthorized access attempts to the Anviz CX2 Lite devices.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>unauthorized-access</category><category>iot</category></item><item><title>Anviz CX2 Lite and CX7 Unauthenticated Remote Code Execution via Unverified Update Packages (CVE-2026-40066)</title><link>https://feed.craftedsignal.io/briefs/2026-04-anviz-rce/</link><pubDate>Fri, 17 Apr 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-anviz-rce/</guid><description>Anviz CX2 Lite and CX7 devices are vulnerable to unverified update packages that allow for unauthenticated remote code execution by unpacking and executing a malicious script.</description><content:encoded><![CDATA[<p>The Anviz CX2 Lite and CX7 devices are susceptible to a critical vulnerability (CVE-2026-40066) stemming from the lack of integrity checks on update packages. An attacker can upload a crafted update package to the device. The vulnerable devices then unpack the contents of this package and execute a script without proper authentication or verification. This leads to unauthenticated remote code execution, potentially allowing the attacker to gain complete control over the compromised device. The vulnerability was reported by ICS-CERT and assigned a CVSS v3.1 base score of 8.8, indicating a high severity. Successful exploitation of this vulnerability allows an attacker to perform any action on the device, including stealing data, installing malware, or using the device as a foothold for further attacks on the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Anviz CX2 Lite or CX7 device accessible on the network.</li>
<li>Attacker crafts a malicious update package containing a script designed for remote code execution.</li>
<li>The attacker uploads the malicious update package to the device&rsquo;s update interface. Due to the vulnerability, this upload may not require authentication.</li>
<li>The device unpacks the contents of the update package, including the malicious script.</li>
<li>The device executes the script without proper verification or sanitization.</li>
<li>The malicious script executes arbitrary commands on the device.</li>
<li>The attacker gains remote shell access to the device.</li>
<li>The attacker leverages the compromised device to move laterally within the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40066 results in unauthenticated remote code execution on the affected Anviz CX2 Lite and CX7 devices. This can lead to complete compromise of the device, allowing attackers to steal sensitive data, install malware, or use the device as a pivot point to gain access to other systems on the network. Given the potential for widespread deployment of these devices in various sectors, the impact could be significant, affecting many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from Anviz to address CVE-2026-40066.</li>
<li>Monitor network traffic for suspicious activity related to Anviz devices attempting to download or install update packages, and deploy the network connection rule below.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Anviz device on other systems.</li>
<li>Monitor process creation on Anviz devices for unusual or unexpected processes, and deploy the process creation rule below.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-40066</category><category>rce</category><category>iot</category></item><item><title>Totolink A800R Remote Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-a800r-buffer-overflow/</link><pubDate>Mon, 13 Apr 2026 04:26:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-a800r-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in the Totolink A800R router version 4.1.2cu.5137_B20200730, allowing unauthenticated attackers to potentially execute arbitrary code by overflowing the apcliSsid argument in the setAppEasyWizardConfig function within the /lib/cste_modules/app.so library.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-6157, has been discovered in Totolink A800R routers running firmware version 4.1.2cu.5137_B20200730. The vulnerability resides within the <code>setAppEasyWizardConfig</code> function in the <code>/lib/cste_modules/app.so</code> library. Successful exploitation allows remote attackers to potentially execute arbitrary code on the device. Publicly available exploits exist, increasing the risk of widespread exploitation. Routers are often the perimeter defense for networks making them lucrative targets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A800R router with firmware version 4.1.2cu.5137_B20200730 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>setAppEasyWizardConfig</code> function.</li>
<li>The malicious request includes an overly long string as the value for the <code>apcliSsid</code> argument.</li>
<li>The router receives the HTTP request and passes the <code>apcliSsid</code> argument to the <code>setAppEasyWizardConfig</code> function.</li>
<li>The <code>setAppEasyWizardConfig</code> function copies the contents of <code>apcliSsid</code> into a fixed-size buffer without proper bounds checking.</li>
<li>The overly long <code>apcliSsid</code> string overflows the buffer, overwriting adjacent memory locations.</li>
<li>The attacker carefully crafts the overflowed data to overwrite the return address of the function.</li>
<li>When the function returns, control is transferred to the attacker&rsquo;s code, leading to arbitrary code execution. This could lead to the installation of malware or complete control of the device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability grants the attacker the ability to execute arbitrary code on the affected Totolink A800R router. This can result in complete compromise of the device, enabling the attacker to intercept network traffic, modify router settings, or use the router as a launching point for further attacks within the network. Given the availability of public exploits, a large number of devices could be vulnerable, making this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available firmware updates from Totolink to patch CVE-2026-6157.</li>
<li>Monitor network traffic for suspicious HTTP requests targeting the <code>setAppEasyWizardConfig</code> function, as described in the attack chain. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement network segmentation to limit the impact of a compromised router.</li>
<li>If updates are unavailable, consider replacing the vulnerable device.</li>
<li>Disable remote management access to the router to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6157</category><category>buffer-overflow</category><category>router</category><category>iot</category></item><item><title>Tenda F451 Router Stack-Based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</link><pubDate>Sun, 12 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-f451-bo/</guid><description>A remote stack-based buffer overflow vulnerability exists in the fromDhcpListClient function of the /goform/DhcpListClient component (httpd) within Tenda F451 firmware version 1.0.0.7, triggered by manipulating the 'page' argument, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability has been identified in Tenda F451 router firmware version 1.0.0.7. The vulnerability resides in the <code>fromDhcpListClient</code> function within the <code>/goform/DhcpListClient</code> component&rsquo;s httpd service. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious <code>page</code> argument. This can lead to arbitrary code execution on the device. Given the public availability of the exploit (CVE-2026-6120), Tenda F451 routers are at immediate risk of compromise if not properly secured. This vulnerability poses a significant threat due to the widespread use of Tenda routers in home and small office environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Tenda F451 router running vulnerable firmware version 1.0.0.7.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/goform/DhcpListClient</code> endpoint.</li>
<li>The crafted request includes a <code>page</code> argument with a string exceeding the buffer size allocated for it in the <code>fromDhcpListClient</code> function.</li>
<li>The <code>httpd</code> service on the router receives the malicious request and passes the <code>page</code> argument to the vulnerable function.</li>
<li>The <code>fromDhcpListClient</code> function attempts to copy the oversized <code>page</code> argument into a fixed-size buffer on the stack, causing a buffer overflow.</li>
<li>The overflow overwrites adjacent stack memory, including the return address of the function.</li>
<li>The attacker controls the overwritten return address, redirecting execution to attacker-controlled code or a ROP chain.</li>
<li>The attacker gains arbitrary code execution on the router, potentially leading to complete device compromise and network access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Tenda F451 router. This allows attackers to control the device, intercept network traffic, change DNS settings, inject malicious scripts into web pages served to connected devices, or use the router as a pivot point for further attacks within the network. This vulnerability affects all users of the Tenda F451 router running firmware version 1.0.0.7, potentially impacting thousands of devices globally. Given the high CVSS score of 8.8, the risk is substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting the <code>/goform/DhcpListClient</code> endpoint, especially those with unusually long <code>page</code> parameters (refer to the rule <code>Tenda F451 Suspicious URI Length</code>).</li>
<li>Inspect network traffic for abnormal patterns related to compromised routers (unusual DNS requests, connections to known malicious IPs).</li>
<li>Implement rate limiting and input validation on web server endpoints where possible to mitigate buffer overflow attempts.</li>
<li>Apply any available firmware updates from Tenda to patch CVE-2026-6120, although patches may not be available.</li>
<li>Consider deploying network intrusion detection systems (NIDS) to identify and block exploitation attempts (refer to the <code>Tenda F451 Buffer Overflow Attempt</code> rule).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>tenda</category><category>router</category><category>buffer-overflow</category><category>cve-2026-6120</category><category>iot</category></item><item><title>Disruption of Large IoT DDoS Botnets</title><link>https://feed.craftedsignal.io/briefs/2024-01-iot-ddos-disruption/</link><pubDate>Fri, 20 Mar 2026 05:50:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-iot-ddos-disruption/</guid><description>Law enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.</description><content:encoded><![CDATA[<p>Authorities have dismantled a globally distributed network of compromised Internet of Things (IoT) devices that were being leveraged to conduct large-scale DDoS attacks. The botnets consisted of a large number of IoT devices. These attacks overwhelmed target systems, rendering them inaccessible. While the specific devices, malware, and attribution remain undisclosed in the provided source, the disruption of these botnets is a significant event for defenders, as it reduces the overall capacity for attackers to launch extremely large DDoS attacks. The botnets were responsible for record-breaking attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Compromise IoT Devices: Attackers exploit vulnerabilities (e.g., default credentials, unpatched firmware) on IoT devices such as routers, cameras, and DVRs.</li>
<li>Install Malware: Malicious software specifically designed for the IoT architecture is installed on the compromised devices.</li>
<li>Botnet Formation: The malware turns the IoT devices into bots, which are controlled remotely by a command-and-control (C2) server.</li>
<li>C2 Communication: The bots maintain persistent communication with the C2 server, awaiting instructions for launching attacks.</li>
<li>DDoS Attack Initiation: The C2 server issues commands to the bots, instructing them to flood a target system with malicious traffic.</li>
<li>Traffic Amplification: The bots, now acting in unison, send high volumes of traffic to the target, overwhelming its resources.</li>
<li>Service Disruption: The target system becomes unavailable to legitimate users due to the sheer volume of malicious traffic.</li>
<li>Impact: Disruption of services for targeted organizations, potentially leading to financial losses and reputational damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The DDoS attacks launched by these IoT botnets caused significant service disruptions for targeted organizations. The scope of the attacks was described as &ldquo;record-breaking&rdquo;, suggesting a large number of victims and potential financial losses. Sectors affected are not detailed in the source, but DDoS attacks can impact any organization with an online presence. Successful attacks lead to website and application unavailability, impacting business operations and customer access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual spikes in volume and traffic patterns indicative of DDoS attacks.</li>
<li>Implement rate limiting and traffic filtering on network infrastructure to mitigate the impact of DDoS attacks.</li>
<li>Although no specific IOCs are available, investigate any alerts related to high-volume network traffic originating from internal devices.</li>
<li>Enable logging on network devices to capture potential indicators of compromise and attack activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>iot</category><category>ddos</category><category>botnet</category><category>disruption</category></item><item><title>Mirai C2 Remote Denial-of-Service Vulnerability (CVE-2024-45163)</title><link>https://feed.craftedsignal.io/briefs/2026-03-mirai-c2-dos/</link><pubDate>Mon, 16 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-mirai-c2-dos/</guid><description>CVE-2024-45163 is a remote denial-of-service vulnerability affecting Mirai command and control (C2) infrastructure, potentially disrupting botnet operations and related malicious activities.</description><content:encoded>&lt;p>CVE-2024-45163 describes a remote denial-of-service vulnerability present within Mirai C2 infrastructure. While specific details regarding the vulnerability itself are not provided in this brief, the existence of a publicly known vulnerability in Mirai C2 servers is significant. Mirai is a well-known IoT botnet that has been used in numerous large-scale DDoS attacks. Exploitation of this vulnerability could allow attackers to disrupt Mirai botnet operations, potentially mitigating ongoing…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2024-45163</category><category>mirai</category><category>dos</category><category>iot</category></item></channel></rss>