Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2wx-g95c-8j7q

Опубликовано: 07 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2
CVSS3: 3.5

Описание

A security flaw has been discovered in Grandstream GXP1625 1.0.7.4. The impacted element is an unknown function of the file /cgi-bin/api.values.post of the component Network Status Page. Performing manipulation of the argument vpn_ip results in basic cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

A security flaw has been discovered in Grandstream GXP1625 1.0.7.4. The impacted element is an unknown function of the file /cgi-bin/api.values.post of the component Network Status Page. Performing manipulation of the argument vpn_ip results in basic cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 9%
0.00034
Низкий

2 Low

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 3.5
nvd
2 месяца назад

A security flaw has been discovered in Grandstream GXP1625 1.0.7.4. The impacted element is an unknown function of the file /cgi-bin/api.values.post of the component Network Status Page. Performing manipulation of the argument vpn_ip results in basic cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 9%
0.00034
Низкий

2 Low

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-74