<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Frangoteam — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/frangoteam/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/frangoteam/feed.xml" rel="self" type="application/rss+xml"/><item><title>FUXA 1.2.8 Authentication Bypass and Remote Command Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-fuxa-rce/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-fuxa-rce/</guid><description>FUXA 1.2.8 and earlier is vulnerable to an authentication bypass vulnerability (CVE-2025-69985) that allows remote command execution by exploiting the /api/runscript endpoint with a crafted JavaScript payload.</description><content:encoded><![CDATA[<p>FUXA, a web-based SCADA/HMI software, versions 1.2.8 and earlier, contains an authentication bypass vulnerability (CVE-2025-69985). This vulnerability allows unauthenticated attackers to execute arbitrary commands on the server by exploiting the <code>/api/runscript</code> endpoint. The exploit uses a crafted JavaScript payload leveraging <code>child_process.execSync</code> to execute commands, capturing the full standard output. This vulnerability was discovered and published in February 2026 by Joshua van der Poll, and a proof-of-concept exploit is publicly available. Successful exploitation leads to complete system compromise, emphasizing the critical need for patching and detection measures. The vulnerability has been patched in versions of FUXA greater than 1.2.8.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a POST request to <code>/api/runscript</code>.</li>
<li>The attacker crafts a JSON payload containing a <code>script</code> parameter with malicious JavaScript code.</li>
<li>The JavaScript code utilizes the <code>child_process.execSync</code> function to execute arbitrary commands on the system.</li>
<li>The <code>execSync</code> function captures the standard output and standard error of the executed command.</li>
<li>The captured output is returned in the HTTP response.</li>
<li>The attacker parses the HTTP response to retrieve the output of the executed command.</li>
<li>The attacker can then use the command execution to perform further actions, such as reading sensitive files, installing malware, or creating new user accounts.</li>
<li>The attacker achieves full remote command execution, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the FUXA server. This can lead to complete system compromise, including data theft, service disruption, and the installation of malware. Given the nature of SCADA/HMI software, this could have significant consequences for industrial control systems and critical infrastructure. While specific victim numbers are unavailable, the potential impact is high due to the critical nature of the targeted software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FUXA to a version greater than 1.2.8 to patch CVE-2025-69985.</li>
<li>Deploy the Sigma rule &ldquo;Detect FUXA API Runscript Exploitation&rdquo; to your SIEM to identify exploitation attempts against the <code>/api/runscript</code> endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/api/runscript</code> with unusual or suspicious JavaScript code in the <code>script</code> parameter, as detected by the rule &ldquo;Detect Suspicious Javascript in FUXA API Runscript&rdquo;.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise, isolating FUXA servers from other critical systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication-bypass</category><category>remote-code-execution</category><category>web-application</category><category>scada</category></item></channel></rss>