<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with moxa]]></title><description><![CDATA[A list of topics that have been tagged with moxa]]></description><link>https://board.circlewithadot.net/tags/moxa</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:02:33 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/moxa.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers.]]></title><description><![CDATA[️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access &amp; monitor for outages. https://radar.offseq.com/threat/cve-2026-3868-cwe-130-improper-handling-of-length--680be2d5 #OffSeq #Moxa #Infosec #ICS]]></description><link>https://board.circlewithadot.net/topic/a7db68ca-96ae-4031-9067-c452c1fd8692/high-severity-cve-2026-3868-affects-moxa-edr-8010-v1.0-routers.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/a7db68ca-96ae-4031-9067-c452c1fd8692/high-severity-cve-2026-3868-affects-moxa-edr-8010-v1.0-routers.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>