D-Link DSL-2740E 1.00_BG_20150720 devices are prone to persistent XSS attacks in the username and password fields: a remote unauthenticated user may craft logins and passwords with script tags in them. Because there is no sanitization in the input fields, an unaware logged-in administrator may be a victim when checking the router logs.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101622 | Third Party Advisory VDB Entry |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-018/?fid=8411 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/101622 | Third Party Advisory VDB Entry |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-018/?fid=8411 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101622 - Third Party Advisory, VDB Entry | |
References | () https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-018/?fid=8411 - Exploit, Third Party Advisory |
Information
Published : 2017-10-31 07:29
Updated : 2024-11-21 02:44
NVD link : CVE-2016-10699
Mitre link : CVE-2016-10699
CVE.ORG link : CVE-2016-10699
JSON object : View
Products Affected
dlink
- dsl-2740e
- dsl-2740e_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')