Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v2jw-37ph-r5p4

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple open redirect vulnerabilities on the Conceptronic C54APM access point with runtime code 1.26 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the submit-url parameter in a Refresh action to goform/formWlSiteSurvey or (2) the wlan-url parameter to goform/formWlanSetup.

Multiple open redirect vulnerabilities on the Conceptronic C54APM access point with runtime code 1.26 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the submit-url parameter in a Refresh action to goform/formWlSiteSurvey or (2) the wlan-url parameter to goform/formWlanSetup.

EPSS

Процентиль: 48%
0.00253
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
около 12 лет назад

Multiple open redirect vulnerabilities on the Conceptronic C54APM access point with runtime code 1.26 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the submit-url parameter in a Refresh action to goform/formWlSiteSurvey or (2) the wlan-url parameter to goform/formWlanSetup.

EPSS

Процентиль: 48%
0.00253
Низкий

Дефекты

CWE-20