This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the DDNS Username parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.

Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-56426 This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the DDNS Username parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
Fixes

Solution

Upgrade to latest version 4.1.1.25 or later.


Workaround

No workaround given by the vendor.

History

Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-06-17T21:19:17.835Z

Reserved: 2023-12-22T09:53:53.226Z

Link: CVE-2023-51729

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:34.163Z

cve-icon NVD

Status : Modified

Published: 2024-01-17T07:15:52.113

Modified: 2024-11-21T08:38:41.257

Link: CVE-2023-51729

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.