<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sipeed — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/sipeed/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 25 Apr 2026 17:16:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/sipeed/feed.xml" rel="self" type="application/rss+xml"/><item><title>PicoClaw Web Launcher Management Plane Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-picoclaw-cmd-injection/</link><pubDate>Sat, 25 Apr 2026 17:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-picoclaw-cmd-injection/</guid><description>PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.</description><content:encoded><![CDATA[<p>A command injection vulnerability exists in PicoClaw version 0.2.4, specifically affecting the <code>/api/gateway/restart</code> endpoint within the Web Launcher Management Plane component. This flaw allows unauthenticated remote attackers to inject and execute arbitrary commands on the underlying system. The vulnerability, identified as CVE-2026-6987, stems from improper neutralization of special elements in the input to the <code>/api/gateway/restart</code> function. The project maintainers were notified through an issue report, but as of the time of disclosure, no response or patch has been released. This vulnerability poses a significant risk, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable PicoClaw instance running version 0.2.4.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/api/gateway/restart</code> endpoint.</li>
<li>Within the request, the attacker injects OS commands into a parameter processed by the vulnerable function.</li>
<li>The PicoClaw application fails to properly sanitize the attacker-supplied input.</li>
<li>The application executes the injected commands with the privileges of the web server process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker uses the initial foothold to escalate privileges, potentially gaining root access.</li>
<li>The attacker installs malware, exfiltrates sensitive data, or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this command injection vulnerability allows a remote attacker to execute arbitrary commands on the affected system. This could lead to complete system compromise, data theft, or denial of service. Given the nature of command injection, the attacker may be able to escalate privileges and gain full control over the server. The number of potential victims is unknown, but any PicoClaw installation running version 0.2.4 exposed to the network is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches for PicoClaw as soon as they are released to remediate CVE-2026-6987.</li>
<li>Implement input validation and sanitization on the <code>/api/gateway/restart</code> endpoint to prevent command injection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PicoClaw Restart Requests</code> to monitor for exploitation attempts.</li>
<li>Monitor web server logs for unusual activity or suspicious commands executed via HTTP requests, correlating with requests to <code>/api/gateway/restart</code>.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the <code>/api/gateway/restart</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>web-application</category></item></channel></rss>