<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🚩 H3C Magic B1 devices ≤100R004 hit by HIGH severity buffer overflow (CVE-2026-6581).]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6a9.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--triangular_flag_on_post" style="height:23px;width:auto;vertical-align:middle" title="🚩" alt="🚩" /> H3C Magic B1 devices ≤100R004 hit by HIGH severity buffer overflow (CVE-2026-6581). Public exploit code out, no vendor patch yet. Restrict management interface access &amp; monitor /goform/aspForm activity. Details: <a href="https://radar.offseq.com/threat/cve-2026-6581-buffer-overflow-in-h3c-magic-b1-6a61fe35" rel="nofollow noopener"><span>https://</span><span>radar.offseq.com/threat/cve-20</span><span>26-6581-buffer-overflow-in-h3c-magic-b1-6a61fe35</span></a> <a href="https://infosec.exchange/tags/OffSeq" rel="tag">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/Vuln" rel="tag">#<span>Vuln</span></a> <a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/434/091/251/853/173/original/88f056bef31a8807.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/a0b7515d-4edf-414a-a9b6-0827571759ac/h3c-magic-b1-devices-100r004-hit-by-high-severity-buffer-overflow-cve-2026-6581-.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 03:49:12 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a0b7515d-4edf-414a-a9b6-0827571759ac.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 20 Apr 2026 00:00:38 GMT</pubDate><ttl>60</ttl></channel></rss>