Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqmv-v9rx-849w

Опубликовано: 24 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 4.8
CVSS3: 2.4

Описание

A vulnerability classified as problematic has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected is an unknown function of the file /goform/portForwardingCfg of the component Port Forwarding Submenu. The manipulation of the argument pf_Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability classified as problematic has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected is an unknown function of the file /goform/portForwardingCfg of the component Port Forwarding Submenu. The manipulation of the argument pf_Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 18%
0.00058
Низкий

4.8 Medium

CVSS4

2.4 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 2.4
nvd
12 месяцев назад

A vulnerability classified as problematic has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected is an unknown function of the file /goform/portForwardingCfg of the component Port Forwarding Submenu. The manipulation of the argument pf_Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 18%
0.00058
Низкий

4.8 Medium

CVSS4

2.4 Low

CVSS3

Дефекты

CWE-79