<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network-Device — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network-device/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 08:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network-device/feed.xml" rel="self" type="application/rss+xml"/><item><title>TRENDnet TEW-821DAP Firmware Update Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-trendnet-buffer-overflow/</link><pubDate>Sat, 02 May 2026 08:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-trendnet-buffer-overflow/</guid><description>A buffer overflow vulnerability exists in TRENDnet TEW-821DAP version 1.12B01, allowing a remote attacker to execute arbitrary code by manipulating the 'str' argument in the auto_update_firmware function of the Firmware Update component.</description><content:encoded><![CDATA[<p>CVE-2026-7607 describes a buffer overflow vulnerability affecting TRENDnet TEW-821DAP version 1.12B01. The vulnerability resides within the auto_update_firmware function of the Firmware Update component. A remote attacker can exploit this flaw by sending a crafted request with a maliciously oversized &lsquo;str&rsquo; argument, leading to a buffer overflow. Although the CVSS score is high, the vendor has stated that the affected product reached its end-of-life 8 years ago and is no longer supported, significantly reducing the risk of widespread exploitation. This lack of support means no patches or updates will be provided, leaving vulnerable devices exposed if still in operation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable TRENDnet TEW-821DAP device running firmware version 1.12B01.</li>
<li>Attacker sends a specially crafted network packet to the device, targeting the Firmware Update component.</li>
<li>The packet includes a malicious &lsquo;str&rsquo; argument exceeding the buffer&rsquo;s allocated size in the auto_update_firmware function.</li>
<li>The device attempts to process the firmware update, copying the oversized &lsquo;str&rsquo; argument into the undersized buffer.</li>
<li>The buffer overflow overwrites adjacent memory regions, potentially including critical program data or execution pointers.</li>
<li>Attacker hijacks control of the execution flow by overwriting the return address with the address of malicious code.</li>
<li>The device executes the attacker&rsquo;s arbitrary code with the privileges of the Firmware Update component.</li>
<li>The attacker gains control of the device, potentially enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability could allow an attacker to gain complete control over the affected TRENDnet TEW-821DAP device. This could lead to unauthorized network access, data theft, or the device being used as a bot in a larger attack. Given that the affected product is EOL, the number of actively exploitable devices is likely low, but any remaining devices are at significant risk since no patch will be available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify and isolate any TRENDnet TEW-821DAP devices running firmware version 1.12B01 on your network. Consider decommissioning them if possible due to the end-of-life status and lack of security updates.</li>
<li>Monitor network traffic for suspicious packets targeting the Firmware Update component of TRENDnet devices. Implement intrusion detection rules to identify and block potentially malicious requests (see example Sigma rule below).</li>
<li>Since this is a buffer overflow on a network device, monitor for unusual process creation or network connections originating from TRENDnet devices.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit the vulnerability by monitoring for unusual data lengths in network traffic related to firmware updates.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>buffer-overflow</category><category>firmware-update</category><category>network-device</category></item><item><title>D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</link><pubDate>Fri, 24 Apr 2026 04:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dlink-brute-force-bypass/</guid><description>D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.</description><content:encoded><![CDATA[<p>The D-Link DWM-222W USB Wi-Fi Adapter is susceptible to a brute-force protection bypass vulnerability (CVE-2026-6947). This flaw allows an attacker on an adjacent network to circumvent the built-in login attempt limits. By repeatedly attempting different credentials without being blocked, an attacker can successfully brute-force the password and gain unauthorized access to the device. This vulnerability poses a significant risk as it enables attackers to potentially reconfigure the device, intercept network traffic, or use the compromised device as a pivot point for further attacks within the network. Successful exploitation leads to full control over the D-Link Wi-Fi adapter.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker locates a vulnerable D-Link DWM-222W USB Wi-Fi Adapter within adjacent network range.</li>
<li>The attacker initiates network communication with the device, targeting its login interface, likely via HTTP or HTTPS.</li>
<li>The attacker sends a series of login requests with different username and password combinations.</li>
<li>Due to the brute-force protection bypass, the device does not enforce login attempt limits or implement account lockout mechanisms.</li>
<li>The attacker continues sending login requests until the correct credentials are found.</li>
<li>Upon successful authentication, the attacker gains administrative access to the D-Link DWM-222W USB Wi-Fi Adapter&rsquo;s configuration interface.</li>
<li>The attacker reconfigures the device to their specifications potentially enabling remote access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6947 allows an attacker to gain complete control over the D-Link DWM-222W USB Wi-Fi Adapter. This can lead to unauthorized access to the network it connects to, data interception, or the device being used as a launchpad for further attacks within the network. The impact is significant, as it bypasses standard security measures and grants full administrative privileges to the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for excessive authentication attempts targeting the D-Link DWM-222W USB Wi-Fi Adapter to detect potential brute-force attacks. Deploy the Sigma rule <code>Detect Excessive Authentication Attempts</code> to identify such activity.</li>
<li>Implement network segmentation to limit the impact of a compromised D-Link DWM-222W USB Wi-Fi Adapter.</li>
<li>If possible, disable remote management interfaces on the D-Link DWM-222W USB Wi-Fi Adapter to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>brute-force</category><category>credential-access</category><category>network-device</category></item><item><title>H3C Magic B0 Router Buffer Overflow Vulnerability (CVE-2026-6560)</title><link>https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-buffer-overflow/</link><pubDate>Sun, 19 Apr 2026 07:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-h3c-magic-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-6560) in H3C Magic B0 up to 100R002 allows remote attackers to execute arbitrary code by manipulating the 'param' argument in the Edit_BasicSSID function of the /goform/aspForm file.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability (CVE-2026-6560) has been identified in H3C Magic B0 routers, specifically in versions up to 100R002. The vulnerability resides within the <code>Edit_BasicSSID</code> function of the <code>/goform/aspForm</code> file. An attacker can remotely exploit this flaw by crafting malicious input to the <code>param</code> argument, leading to arbitrary code execution on the device. Public exploits are reportedly available, increasing the risk of widespread exploitation. The vendor was notified about this vulnerability, but has not provided any response or patch as of April 2026. This poses a significant risk to users of the affected H3C Magic B0 routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable H3C Magic B0 router running firmware version 100R002 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/aspForm</code> endpoint.</li>
<li>The POST request includes the <code>Edit_BasicSSID</code> function call.</li>
<li>The <code>param</code> argument within the POST data contains a specially crafted string exceeding the buffer size allocated in the <code>Edit_BasicSSID</code> function.</li>
<li>The buffer overflow occurs when the <code>Edit_BasicSSID</code> function processes the oversized <code>param</code> argument without proper bounds checking.</li>
<li>The overflow overwrites adjacent memory regions, potentially including the return address on the stack.</li>
<li>The attacker gains control of the program execution flow.</li>
<li>The attacker executes arbitrary code on the router, potentially gaining full control of the device, exfiltrating data, or using it as a pivot point for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability (CVE-2026-6560) allows a remote attacker to execute arbitrary code on the affected H3C Magic B0 router. This could lead to a complete compromise of the device, including the ability to modify router settings, intercept network traffic, and potentially gain access to connected devices on the network. Given the availability of public exploits, widespread exploitation is possible, potentially impacting a large number of home and small business networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/goform/aspForm</code> with unusually long <code>param</code> arguments (refer to the Attack Chain section).</li>
<li>Implement rate limiting for requests to <code>/goform/aspForm</code> to mitigate potential exploitation attempts (refer to the Attack Chain section).</li>
<li>Deploy the following Sigma rule to detect exploitation attempts targeting the vulnerable <code>Edit_BasicSSID</code> function.</li>
<li>Block network traffic originating from or destined to H3C Magic B0 devices until a patch is available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-6560</category><category>h3c</category><category>router</category><category>network device</category></item><item><title>Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)</title><link>https://feed.craftedsignal.io/briefs/2026-04-totolink-os-command-injection/</link><pubDate>Mon, 06 Apr 2026 19:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-totolink-os-command-injection/</guid><description>A remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability, tracked as CVE-2026-5677, has been identified in Totolink A7100RU routers running firmware version 7.4cu.2313_b20191024. The vulnerability resides within the <code>CsteSystem</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>resetFlags</code> argument, a remote attacker can inject and execute arbitrary operating system commands on the affected device. This exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation allows an attacker to gain complete control over the device, potentially leading to data theft, denial of service, or use of the router as part of a botnet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A7100RU router with firmware version 7.4cu.2313_b20191024.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>resetFlags</code> argument with a malicious payload containing OS commands.</li>
<li>The <code>CsteSystem</code> function processes the request without proper sanitization of the <code>resetFlags</code> argument.</li>
<li>The injected OS commands are executed with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the router&rsquo;s operating system.</li>
<li>The attacker can then install persistent backdoors, modify router settings, or use the device for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5677 allows a remote attacker to execute arbitrary commands on vulnerable Totolink A7100RU routers. This can lead to complete compromise of the device, enabling attackers to steal sensitive information, disrupt network services, or use the router as a launchpad for other attacks, such as botnet participation or man-in-the-middle attacks. Given the widespread use of Totolink routers, a successful large-scale exploitation could affect thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Totolink A7100RU CsteSystem Command Injection Attempt</code> to your SIEM to identify malicious requests to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>Inspect web server logs for suspicious POST requests to <code>/cgi-bin/cstecgi.cgi</code> containing shell metacharacters in the <code>resetFlags</code> parameter to detect exploitation attempts (webserver logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5677</category><category>totolink</category><category>command-injection</category><category>network-device</category></item><item><title>Hirschmann EagleSDV Denial-of-Service Vulnerability (CVE-2022-4986)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hirschmann-dos/</link><pubDate>Thu, 02 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hirschmann-dos/</guid><description>Hirschmann EagleSDV devices are vulnerable to denial-of-service (DoS) attacks where a device crash can be triggered by establishing TLS 1.0 or TLS 1.1 connections, leading to service disruption.</description><content:encoded><![CDATA[<p>Hirschmann EagleSDV devices are susceptible to a denial-of-service vulnerability, identified as CVE-2022-4986. This vulnerability allows an attacker to crash the device by establishing TLS sessions using the outdated TLS 1.0 or TLS 1.1 protocols. Successful exploitation results in service unavailability, impacting network operations reliant on the affected device. The vulnerability stems from improper handling of older TLS versions during session establishment. Given the critical role EagleSDV devices play in network infrastructure, this vulnerability poses a significant risk to organizations that have not yet patched their systems or disabled the deprecated protocols.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Hirschmann EagleSDV device accessible over the network.</li>
<li>The attacker crafts a TLS connection request using TLS 1.0.</li>
<li>The attacker sends the crafted TLS 1.0 connection request to the target EagleSDV device.</li>
<li>The EagleSDV device attempts to process the TLS 1.0 handshake.</li>
<li>Due to the vulnerability, the device encounters an error during the session establishment phase of the TLS handshake.</li>
<li>This error leads to uncontrolled resource consumption (CWE-400) within the device&rsquo;s TLS processing module.</li>
<li>The resource exhaustion causes the device&rsquo;s operating system to become unstable.</li>
<li>The device crashes, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-4986 leads to a denial-of-service condition on the affected Hirschmann EagleSDV device. This can disrupt network services and cause downtime. The number of affected devices and sectors is unknown, but the impact could be significant for organizations relying on these devices for critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Disable TLS 1.0 and TLS 1.1 on all Hirschmann EagleSDV devices to mitigate the vulnerability described in CVE-2022-4986.</li>
<li>Monitor network traffic for attempts to establish TLS connections using TLS 1.0 and TLS 1.1 to identify potential exploitation attempts using a network monitoring solution (network_connection log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>cve-2022-4986</category><category>network-device</category></item><item><title>Linksys MR9600 SmartConnect OS Command Injection (CVE-2026-4558)</title><link>https://feed.craftedsignal.io/briefs/2026-03-linksys-rce/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-linksys-rce/</guid><description>A remote OS command injection vulnerability exists in the Linksys MR9600 router version 2.0.6.206937, allowing attackers to execute arbitrary commands by manipulating specific function arguments via the SmartConnect.lua file.</description><content:encoded><![CDATA[<p>CVE-2026-4558 is a critical vulnerability affecting Linksys MR9600 routers, specifically version 2.0.6.206937. The flaw resides within the <code>smartConnectConfigure</code> function of the <code>SmartConnect.lua</code> file. Attackers can remotely inject OS commands by manipulating the <code>configApSsid</code>, <code>configApPassphrase</code>, <code>srpLogin</code>, or <code>srpPassword</code> arguments. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but has not yet provided a patch or response, leaving users…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-4558</category><category>linksys</category><category>command-injection</category><category>network-device</category></item><item><title>Totolink A8000RU OS Command Injection Vulnerability (CVE-2026-7154)</title><link>https://feed.craftedsignal.io/briefs/2024-01-totolink-a8000ru-command-injection/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totolink-a8000ru-command-injection/</guid><description>A remote OS command injection vulnerability exists in the Totolink A8000RU router version 7.1cu.643_b20200521, allowing attackers to execute arbitrary commands by manipulating the 'tty_server' argument in the 'setAdvancedInfoShow' function.</description><content:encoded><![CDATA[<p>CVE-2026-7154 describes a critical vulnerability affecting the Totolink A8000RU router, specifically version 7.1cu.643_b20200521. The vulnerability is located in the <code>setAdvancedInfoShow</code> function within the <code>/cgi-bin/cstecgi.cgi</code> file, which handles CGI requests. An attacker can remotely exploit this flaw by manipulating the <code>tty_server</code> argument, leading to OS command injection. This means an unauthenticated attacker can potentially execute arbitrary commands on the underlying operating system of the router. The exploit is publicly available, increasing the likelihood of exploitation in the wild. Successful exploitation allows complete control over the device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink A8000RU router with the affected firmware version exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The crafted request includes the <code>setAdvancedInfoShow</code> function call with a manipulated <code>tty_server</code> argument containing an OS command injection payload.</li>
<li>The webserver receives the crafted request and passes the <code>tty_server</code> argument to the vulnerable function.</li>
<li>The vulnerable function executes the attacker-supplied OS command due to insufficient input validation and sanitization.</li>
<li>The injected command executes with the privileges of the web server process, typically root.</li>
<li>The attacker gains arbitrary code execution on the router&rsquo;s operating system.</li>
<li>The attacker can then use this access to install malware, change router settings, or use the router as a pivot point for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7154 allows a remote, unauthenticated attacker to execute arbitrary commands on the affected Totolink A8000RU router. This can lead to complete compromise of the device, potentially affecting all connected devices on the network. An attacker could steal sensitive information, disrupt network services, or use the compromised router as a botnet node. Given the public availability of the exploit, mass exploitation is a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests to <code>/cgi-bin/cstecgi.cgi</code> with unusual characters or command-like syntax in the <code>tty_server</code> parameter, as this could indicate exploitation attempts (see example Sigma rule below).</li>
<li>Implement network intrusion detection system (IDS) rules to detect attempts to exploit this vulnerability by monitoring HTTP traffic for malicious payloads in the <code>tty_server</code> parameter.</li>
<li>Apply available patches or firmware updates provided by Totolink to address CVE-2026-7154 when they become available.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2026-7154</category><category>command-injection</category><category>network-device</category></item></channel></rss>