Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxrv-64jf-fgmr

Опубликовано: 30 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest.

EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest.

EPSS

Процентиль: 22%
0.00072
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 4.3
nvd
больше 1 года назад

EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest.

EPSS

Процентиль: 22%
0.00072
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-79