Описание
The web interface on the Axesstel MV 410R relies on client-side JavaScript code to validate input, which allows remote attackers to send crafted data, and possibly have unspecified other impact, via a client that does not process JavaScript.
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:h:axesstel:mv_410r:*:*:*:*:*:*:*:*
EPSS
Процентиль: 62%
0.00423
Низкий
7.5 High
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
почти 4 года назад
The web interface on the Axesstel MV 410R relies on client-side JavaScript code to validate input, which allows remote attackers to send crafted data, and possibly have unspecified other impact, via a client that does not process JavaScript.
EPSS
Процентиль: 62%
0.00423
Низкий
7.5 High
CVSS2
Дефекты
CWE-20