| タイトル | datacom DM4100 1.3.6.1.4.1.3709 Cross Site Scripting |
|---|
| 説明 | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface within the Interfaces section (Ethernet configuration). The application does not properly sanitize input provided in the “Name” field, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and executed when the Ethernet configuration page is accessed, as demonstrated by the triggered JavaScript prompt in the administrator’s browser. This indicates a lack of proper input validation and output encoding, potentially enabling attackers to execute arbitrary scripts, leading to session hijacking or unauthorized actions within the management interface. It is recommended to implement strict server-side validation and proper output encoding to prevent script execution. |
|---|
| ソース | ⚠️ http://admin:admin@x.x.x.x/ |
|---|
| ユーザー | Havook (UID 71104) |
|---|
| 送信 | 2026年04月05日 13:34 (22 日 ago) |
|---|
| モデレーション | 2026年04月24日 22:17 (19 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 359560 [Datacom DM4100 1.3.6.1.4.1.3709 Ethernet Configuration Page 名前 クロスサイトスクリプティング] |
|---|
| ポイント | 17 |
|---|