| Título | BDCOM P3310D 0.4.2 10.1.0F Build 86345 Cross Site Scripting |
|---|
| Descripción | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface at index.asp
within the User Management functionality (System Mgr → User Mgr → New). The application fails to properly sanitize input provided in the “User name” parameter, allowing an attacker to inject a malicious payload (e.g., <script>alert(1)</script>) when creating a new user. This payload is then stored and executed whenever the affected page is accessed, as demonstrated by the JavaScript alert being triggered in the administrator’s browser. This indicates improper input validation and output encoding, potentially enabling session hijacking, privilege escalation, or unauthorized actions. It is recommended to implement strict server-side validation and proper output encoding to prevent script execution.
|
|---|
| Fuente | ⚠️ http://admin:admin@x.x.x.x:8082/ |
|---|
| Usuario | Havook (UID 71104) |
|---|
| Sumisión | 2026-04-04 22:35 (hace 21 días) |
|---|
| Moderación | 2026-04-24 21:58 (20 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 359554 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New User Page /index.asp User name secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 17 |
|---|