Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5vrw-6f4h-227q

Опубликовано: 11 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.3

Описание

User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.

User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.

EPSS

Процентиль: 23%
0.00077
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-79

Связанные уязвимости

nvd
2 дня назад

User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.

EPSS

Процентиль: 23%
0.00077
Низкий

5.3 Medium

CVSS4

Дефекты

CWE-79