A reflected cross-site scripting vulnerability exists in the url parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could exploit this issue by tricking a user into following a specially crafted link, granting the attacker javascript execution in the context of the victim's browser.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2021-51 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T17:30:07.440Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20137
No data.
Status : Modified
Published: 2021-12-09T16:15:07.753
Modified: 2024-11-21T05:45:59.630
Link: CVE-2021-20137
No data.
OpenCVE Enrichment
No data.
Weaknesses