CVE-2019-18842

A cross-site scripting (XSS) vulnerability in the configuration web interface of the Jinan USR IOT USR-WIFI232-S/T/G2/H Low Power WiFi Module with web version 1.2.2 allows attackers to leak credentials of the Wi-Fi access point the module is logged into, and the web interface login credentials, by opening a Wi-Fi access point nearby with a malicious SSID.
References
Link Resource
https://www.tildeho.me/theres-javascript-in-my-power-plug/ Exploit Third Party Advisory URL Repurposed
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:usriot:usr-wifi232-s_firmware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:h:usriot:usr-wifi232-s:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:usriot:usr-wifi232-t_firmware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:h:usriot:usr-wifi232-t:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:usriot:usr-wifi232-g2_firmware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:h:usriot:usr-wifi232-g2:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:usriot:usr-wifi232-h_firmware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:h:usriot:usr-wifi232-h:-:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) https://www.tildeho.me/theres-javascript-in-my-power-plug/ - Exploit, Third Party Advisory (MISC) https://www.tildeho.me/theres-javascript-in-my-power-plug/ - Exploit, Third Party Advisory, URL Repurposed

Information

Published : 2020-01-06 21:15

Updated : 2024-02-28 17:28


NVD link : CVE-2019-18842

Mitre link : CVE-2019-18842

CVE.ORG link : CVE-2019-18842


JSON object : View

Products Affected

usriot

  • usr-wifi232-s_firmware
  • usr-wifi232-s
  • usr-wifi232-g2
  • usr-wifi232-g2_firmware
  • usr-wifi232-h
  • usr-wifi232-t_firmware
  • usr-wifi232-h_firmware
  • usr-wifi232-t
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')