Description
Cross-site scripting vulnerability in Rebooter(WATCH BOOT nino RPC-M2C [End of Sale] all firmware versions, WATCH BOOT light RPC-M5C [End of Sale] all firmware versions, WATCH BOOT L-zero RPC-M4L [End of Sale] all firmware versions, WATCH BOOT mini RPC-M4H [End of Sale] all firmware versions, WATCH BOOT nino RPC-M2CS firmware version 1.00A to 1.00D, WATCH BOOT light RPC-M5CS firmware version 1.00A to 1.00D, WATCH BOOT L-zero RPC-M4LS firmware version 1.00A to 1.20A, and Signage Rebooter RPC-M4HSi firmware version 1.00A), PoE Rebooter(PoE BOOT nino PoE8M2 firmware version 1.00A to 1.20A), Scheduler(TIME BOOT mini RSC-MT4H [End of Sale] all firmware versions, TIME BOOT RSC-MT8F [End of Sale] all firmware versions, TIME BOOT RSC-MT8FP [End of Sale] all firmware versions, TIME BOOT mini RSC-MT4HS firmware version 1.00A to 1.10A, and TIME BOOT RSC-MT8FS firmware version 1.00A to 1.00E), and Contact Converter(POSE SE10-8A7B1 firmware version 1.00A to 1.20A) allows a remote attacker with the administrative privilege to inject an arbitrary script via unspecified vectors.
Published: 2022-05-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-33159 Cross-site scripting vulnerability in Rebooter(WATCH BOOT nino RPC-M2C [End of Sale] all firmware versions, WATCH BOOT light RPC-M5C [End of Sale] all firmware versions, WATCH BOOT L-zero RPC-M4L [End of Sale] all firmware versions, WATCH BOOT mini RPC-M4H [End of Sale] all firmware versions, WATCH BOOT nino RPC-M2CS firmware version 1.00A to 1.00D, WATCH BOOT light RPC-M5CS firmware version 1.00A to 1.00D, WATCH BOOT L-zero RPC-M4LS firmware version 1.00A to 1.20A, and Signage Rebooter RPC-M4HSi firmware version 1.00A), PoE Rebooter(PoE BOOT nino PoE8M2 firmware version 1.00A to 1.20A), Scheduler(TIME BOOT mini RSC-MT4H [End of Sale] all firmware versions, TIME BOOT RSC-MT8F [End of Sale] all firmware versions, TIME BOOT RSC-MT8FP [End of Sale] all firmware versions, TIME BOOT mini RSC-MT4HS firmware version 1.00A to 1.10A, and TIME BOOT RSC-MT8FS firmware version 1.00A to 1.00E), and Contact Converter(POSE SE10-8A7B1 firmware version 1.00A to 1.20A) allows a remote attacker with the administrative privilege to inject an arbitrary script via unspecified vectors.
History

No history.

Subscriptions

Meikyo Poe Boot Nino Poe8m2 Poe Boot Nino Poe8m2 Firmware Pose Se10-8a7b1 Pose Se10-8a7b1 Firmware Signage Rebooter Rpc-m4hsi Signage Rebooter Rpc-m4hsi Firmware Time Boot Mini Rsc-mt4h Time Boot Mini Rsc-mt4h Firmware Time Boot Mini Rsc-mt4hs Time Boot Mini Rsc-mt4hs Firmware Time Boot Rsc-mt8f Time Boot Rsc-mt8f Firmware Time Boot Rsc-mt8fp Time Boot Rsc-mt8fp Firmware Time Boot Rsc-mt8fs Time Boot Rsc-mt8fs Firmware Watch Boot L-zero Rpc-m4l Watch Boot L-zero Rpc-m4l Firmware Watch Boot L-zero Rpc-m4ls Watch Boot L-zero Rpc-m4ls Firmware Watch Boot Light Rpc-m5c Watch Boot Light Rpc-m5c Firmware Watch Boot Light Rpc-m5cs Watch Boot Light Rpc-m5cs Firmware Watch Boot Mini Rpc-m4h Watch Boot Mini Rpc-m4h Firmware Watch Boot Nino Rpc-m2c Watch Boot Nino Rpc-m2c Firmware Watch Boot Nino Rpc-m2cs Watch Boot Nino Rpc-m2cs Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-08-03T06:03:52.068Z

Reserved: 2022-04-18T00:00:00.000Z

Link: CVE-2022-28717

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-18T15:15:10.077

Modified: 2024-11-21T06:57:47.823

Link: CVE-2022-28717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses