Soumettre #797368: datacom DM4100 1.3.6.1.4.1.3709 Cross Site Scriptinginformation

Titredatacom DM4100 1.3.6.1.4.1.3709 Cross Site Scripting
DescriptionA stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface within the Interfaces section (Ethernet configuration). The application does not properly sanitize input provided in the “Name” field, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and executed when the Ethernet configuration page is accessed, as demonstrated by the triggered JavaScript prompt in the administrator’s browser. This indicates a lack of proper input validation and output encoding, potentially enabling attackers to execute arbitrary scripts, leading to session hijacking or unauthorized actions within the management interface. It is recommended to implement strict server-side validation and proper output encoding to prevent script execution.
La source⚠️ http://admin:admin@x.x.x.x/
Utilisateur
 Havook (UID 71104)
Soumission05/04/2026 13:34 (il y a 21 jours)
Modérer24/04/2026 22:17 (19 days later)
StatutAccepté
Entrée VulDB359560 [Datacom DM4100 1.3.6.1.4.1.3709 Ethernet Configuration Page Nom cross site scripting]
Points17

Do you want to use VulDB in your project?

Use the official API to access entries easily!