提交 #797368: datacom DM4100 1.3.6.1.4.1.3709 Cross Site Scripting信息

标题datacom DM4100 1.3.6.1.4.1.3709 Cross Site Scripting
描述A stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface within the Interfaces section (Ethernet configuration). The application does not properly sanitize input provided in the “Name” field, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and executed when the Ethernet configuration page is accessed, as demonstrated by the triggered JavaScript prompt in the administrator’s browser. This indicates a lack of proper input validation and output encoding, potentially enabling attackers to execute arbitrary scripts, leading to session hijacking or unauthorized actions within the management interface. It is recommended to implement strict server-side validation and proper output encoding to prevent script execution.
来源⚠️ http://admin:admin@x.x.x.x/
用户
 Havook (UID 71104)
提交2026-04-05 13時34分 (22 日前)
管理2026-04-24 22時17分 (19 days later)
状态已接受
VulDB条目359560 [Datacom DM4100 1.3.6.1.4.1.3709 Ethernet Configuration Page 名称 跨网站脚本]
积分17

Do you know our Splunk app?

Download it now for free!