EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
Wed, 30 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-30T00:00:00
Updated: 2024-10-31T15:56:37.782Z
Reserved: 2024-04-08T00:00:00
Link: CVE-2024-31972
Vulnrichment
Updated: 2024-10-31T15:56:22.431Z
NVD
Status : Awaiting Analysis
Published: 2024-10-30T18:15:06.760
Modified: 2024-11-01T12:57:03.417
Link: CVE-2024-31972
Redhat
No data.