Enviar #797242: BDCOM P3310D 0.4.2 10.1.0F Build 86345 Cross Site Scriptinginformación

TítuloBDCOM P3310D 0.4.2 10.1.0F Build 86345 Cross Site Scripting
DescripciónA stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface at index.asp within the User Management functionality (System Mgr → User Mgr → New). The application fails to properly sanitize input provided in the “User name” parameter, allowing an attacker to inject a malicious payload (e.g., <script>alert(1)</script>) when creating a new user. This payload is then stored and executed whenever the affected page is accessed, as demonstrated by the JavaScript alert being triggered in the administrator’s browser. This indicates improper input validation and output encoding, potentially enabling session hijacking, privilege escalation, or unauthorized actions. It is recommended to implement strict server-side validation and proper output encoding to prevent script execution.
Fuente⚠️ http://admin:admin@x.x.x.x:8082/
Usuario
 Havook (UID 71104)
Sumisión2026-04-04 22:35 (hace 21 días)
Moderación2026-04-24 21:58 (20 days later)
EstadoAceptado
Entrada de VulDB359554 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New User Page /index.asp User name secuencias de comandos en sitios cruzados]
Puntos17

Do you want to use VulDB in your project?

Use the official API to access entries easily!