Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-26392 | Persistent cross-site scripting in the web interface of ipDIO allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into a specific parameter. The XSS payload will be executed when a legitimate user attempts to review history. |
Solution
IPCOMM recommends upgrading to its ip4Cloud device, which is the successor to ipDIO. Contact IPCOMM customer support for assistance with the upgrade. For more information, visit the IPCOMM ip4Cloud product page.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01 |
![]() ![]() |
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:43:40.322Z
Reserved: 2022-02-15T00:00:00.000Z
Link: CVE-2022-21146

Updated: 2024-08-03T02:31:59.864Z

Status : Modified
Published: 2022-03-10T17:45:09.187
Modified: 2024-11-21T06:43:59.143
Link: CVE-2022-21146

No data.

No data.