<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Xiongmai — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/xiongmai/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 17:16:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/xiongmai/feed.xml" rel="self" type="application/rss+xml"/><item><title>Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)</title><link>https://feed.craftedsignal.io/briefs/2026-03-xiongmai-command-injection/</link><pubDate>Sun, 29 Mar 2026 17:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xiongmai-command-injection/</guid><description>Xiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.</description><content:encoded>&lt;p>Xiongmai DVR/NVR devices, specifically models AHB7008T-MH-V2 and NBD7024H-P running firmware version 4.03.R11, are susceptible to root OS command injection (CVE-2026-34005). This vulnerability arises from the inadequate sanitization of the HostName value within the NetWork.NetCommon configuration handler. An authenticated attacker can inject shell metacharacters into the HostName parameter through a DVRIP protocol request via TCP port 34567. Due to the use of the &lt;code>system()&lt;/code> function, these…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-34005</category><category>command-injection</category><category>xiongmai</category><category>dvr</category><category>nvr</category></item></channel></rss>