Skip to content
Threat Feed

Tag

Network

22 briefs RSS
critical advisory

Totolink NR1800X Command Injection Vulnerability

A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.

NR1800X 9.1.0u.6279_B20210910 command-injection router network
2r 1t 1c
critical advisory

Synway SMG Gateway Management Software Unauthenticated OS Command Injection

Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.

SMG Gateway Management Software command-injection rce network
2r 1t 1c
high advisory

Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)

CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.

i9 cve-2026-7036 path-traversal tenda network
2r 1t 1c
high advisory

OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)

A remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.

OVN cve vulnerability network
2r 1t 1c
critical threat

UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices

UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.

Firepower eXtensible Operating System +2 UAT-4356 firestarter cisco backdoor network espionage
2r 2t 2c 2i
critical advisory

Across DR-810 Unauthenticated File Disclosure Vulnerability

Across DR-810 routers are vulnerable to unauthenticated file disclosure, allowing remote attackers to download the rom-0 backup file containing sensitive information, such as router passwords and configuration data, via a simple GET request to the rom-0 endpoint.

cve-2019-25706 file-disclosure router network
2r 1t 1c 4i
medium advisory

Juniper Junos OS and Junos OS Evolved BGP Session Reset Denial of Service (CVE-2026-33797)

CVE-2026-33797 is an improper input validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved that allows an unauthenticated adjacent attacker to reset established BGP sessions via a specific BGP packet, leading to a denial of service condition.

cve-2026-33797 denial-of-service juniper bgp network
3r 2t 1c
critical advisory

Juniper Junos OS MX Series Missing Authorization Vulnerability

CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.

privilege-escalation network juniper
2r 1t 1c
critical advisory

Hirschmann HiLCOS OpenBAT/BAT450 IPv6 IPsec Firewall Bypass (CVE-2021-4477)

CVE-2021-4477 describes a firewall bypass vulnerability in Hirschmann HiLCOS OpenBAT and BAT450 products that can be exploited by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while using an IPv6 Internet connection, allowing attackers to bypass configured firewall rules.

cve-2021-4477 firewall-bypass network
2r 1t 1c
high advisory

Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)

A denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.

dos cve-2020-37216 network
2r 2t 1c
medium advisory

Suricata DoS Vulnerability (CVE-2026-31933)

Specially crafted network traffic can cause Suricata to slow down, leading to a denial-of-service condition in versions prior to 7.0.15 and 8.0.4, as identified by CVE-2026-31933.

dos suricata cve-2026-31933 network
2r 1t 1c 1i
high advisory

Interlock Ransomware Campaign Targeting Enterprise Firewalls

The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.

ransomware firewall network
2r 3t
high advisory

Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent

Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.

fortigate vpn cve-2023-27997 exploit network
3r 2t 3i
critical advisory

Ongoing Exploitation of Cisco SD-WAN Systems

Malicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.

cisco-sdwan vulnerability exploitation network
3r 4t
high advisory

Detecting External RPC Traffic for Initial Access

This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.

Elasticsearch initial-access network rpc
2r 2t
critical advisory

Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)

Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.

FH303/A300 firmware cve-2018-25318 tenda dns-hijacking network
2r 1t 1c
high advisory

Windows Remote Desktop Network Bruteforce Attempt

This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.

Secure Access Firewall +3 rdp bruteforce credential-access windows network
2r 1t
high advisory

Outbound SMB Traffic Detection

This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.

Secure Firewall Threat Defense +4 network smb lateral-movement privilege-escalation
2r 1t
medium advisory

GoBGP Remote Denial of Service via Malformed BGP UPDATE Message

A remote Denial of Service (DoS) vulnerability exists in GoBGP version 4.2.0 and earlier, where a malformed BGP UPDATE message can trigger a runtime error (index out of range panic), crashing the GoBGP process. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon, leading to a complete loss of routing capabilities.

GoBGP denial of service bgp network
2r 1t
high advisory

GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)

A heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.

GnuTLS cve-2026-33846 dtls heap overflow network
2r 1t 1c
high advisory

Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability

A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.

Nexus 9000 Series Fabric Switches in ACI mode cve-2023-20185 information-disclosure network
2r 1t 1c
medium advisory

SMB (Windows File Sharing) Activity to the Internet

This rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.

initial-access exfiltration network
2r 2t