<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Legacy-Device — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/legacy-device/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 05:16:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/legacy-device/feed.xml" rel="self" type="application/rss+xml"/><item><title>D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)</title><link>https://feed.craftedsignal.io/briefs/2026-03-dlink-command-injection/</link><pubDate>Tue, 24 Mar 2026 05:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dlink-command-injection/</guid><description>CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.</description><content:encoded><![CDATA[<p>CVE-2026-4627 is an OS command injection vulnerability affecting D-Link DIR-825 and DIR-825R routers, specifically versions 1.0.5 and 4.5.1. The vulnerability resides within the <code>handler_update_system_time</code> function of the <code>libdeuteron_modules.so</code> file, which is part of the NTP service. An attacker with administrative privileges can inject arbitrary OS commands by manipulating the input to this function. The vulnerability can be exploited remotely, allowing a threat actor to potentially gain…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>legacy-device</category></item></channel></rss>