| 标题 | datacom DM4100 1.3.6.1.4.1.3709 Cross Site Scripting |
|---|
| 描述 | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface within the Interfaces section (Ethernet configuration). The application does not properly sanitize input provided in the “Name” field, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and executed when the Ethernet configuration page is accessed, as demonstrated by the triggered JavaScript prompt in the administrator’s browser. This indicates a lack of proper input validation and output encoding, potentially enabling attackers to execute arbitrary scripts, leading to session hijacking or unauthorized actions within the management interface. It is recommended to implement strict server-side validation and proper output encoding to prevent script execution. |
|---|
| 来源 | ⚠️ http://admin:admin@x.x.x.x/ |
|---|
| 用户 | Havook (UID 71104) |
|---|
| 提交 | 2026-04-05 13時34分 (22 日前) |
|---|
| 管理 | 2026-04-24 22時17分 (19 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 359560 [Datacom DM4100 1.3.6.1.4.1.3709 Ethernet Configuration Page 名称 跨网站脚本] |
|---|
| 积分 | 17 |
|---|