Thomson TCW710 ST5D.10.05 /goform/RgTime TimeServer1/TimeServer2/TimeServer3 Persistent cross site scripting
A vulnerability has been found in Thomson TCW710 ST5D.10.05 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /goform/RgTime. The manipulation of the argument TimeServer1/TimeServer2/TimeServer3 with the input ><script>alert(1)</script>
as part of POST Request leads to basic cross site scripting (Persistent). The CWE definition for the vulnerability is CWE-80. The weakness was disclosed 02/19/2018 by moikano as Auditando router thomson tcw710 as Advisory (Website). The advisory is shared at alquimistadesistemas.com.
This vulnerability is known as CVE-2018-25036. The attack can be launched remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The price for an exploit might be around USD $0-$5k at the moment. MITRE ATT&CK project uses the attack technique T1059.007 for this issue.
It is declared as proof-of-concept. It is possible to download the exploit at alquimistadesistemas.com. We expect the 0-day to have been worth approximately $0-$5k.
It is recommended to apply restrictive firewalling. A possible mitigation has been published even before and not after the disclosure of the vulnerability.