<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[HIGH severity alert: CVE-2026-8234 stack buffer overflow in EFM ipTIME A8004T (v14.18.2) — remote, unauthenticated exploit possible.]]></title><description><![CDATA[<p>HIGH severity alert: CVE-2026-8234 stack buffer overflow in EFM ipTIME A8004T (v14.18.2) — remote, unauthenticated exploit possible. No patch yet; restrict remote access now. Details: <a href="https://radar.offseq.com/threat/cve-2026-8234-stack-based-buffer-overflow-in-efm-i-fc36030f" rel="nofollow noopener"><span>https://</span><span>radar.offseq.com/threat/cve-20</span><span>26-8234-stack-based-buffer-overflow-in-efm-i-fc36030f</span></a> <a href="https://infosec.exchange/tags/OffSeq" rel="tag">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/CVE20268234" rel="tag">#<span>CVE20268234</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" rel="tag">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" rel="tag">#<span>Infosec</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/549/106/103/236/003/original/afec60f983531d13.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/26258426-1a08-469e-b4c2-ff7be163b3b3/high-severity-alert-cve-2026-8234-stack-buffer-overflow-in-efm-iptime-a8004t-v14.18.2-remote-unauthenticated-exploit-possible.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:28:37 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/26258426-1a08-469e-b4c2-ff7be163b3b3.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 10 May 2026 07:30:25 GMT</pubDate><ttl>60</ttl></channel></rss>