Submeter #698650: Grandstream GXP1625 1.0.7.4 xssinformação

TítuloGrandstream GXP1625 1.0.7.4 xss
DescriçãoNormal user update system variable to inject xss payload to network status info. It happens to the endpoint '/cgi-bin/api.values.post' can update system variable. Then normal user can call the endpoint to update vpn_ip, then the value will stored in the system. Every visit of network status can triggered the XSS vulnerability. One of the usage is to steal admin's cookie for further action. Report: https://drive.google.com/file/d/1rsskCaj4TwiaGG9_VYabjnKMP_zAry7L/view?usp=sharing pwd: YyF2mcRcCLR123MX24
Fonte⚠️ https://drive.google.com/file/d/1rsskCaj4TwiaGG9_VYabjnKMP_zAry7L/view?usp=sharing
Utilizador
 cccll (UID 92824)
Submissão20/11/2025 15h11 (há 5 meses)
Moderação06/12/2025 15h01 (16 days later)
EstadoAceite
Entrada VulDB334606 [Grandstream GXP1625 1.0.7.4 Network Status Page /cgi-bin/api.values.post vpn_ip Script de Site Cruzado]
Pontos20

Want to know what is going to be exploited?

We predict KEV entries!