No analysis available yet.
Vendor Solution
The vendor provides a firmware update to version 7.42B (or higher) which can be downloaded via the vendor's customer server portal.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 12 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue. | Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts. |
| Title | Insecure Password Change Function | Reflected Cross Site Scripting |
| Weaknesses | CWE-620 |
Thu, 12 Dec 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from reflected XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in, which makes it ideal for login form phishing attempts. | The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue. |
| Title | Reflected cross site scripting | Insecure Password Change Function |
| Weaknesses | CWE-620 |
Thu, 12 Dec 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from reflected XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in, which makes it ideal for login form phishing attempts. | |
| Title | Reflected cross site scripting | |
| Weaknesses | CWE-79 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T21:55:19.162Z
Reserved: 2024-05-29T06:48:49.688Z
Link: CVE-2024-36494
Updated: 2025-11-03T21:55:19.162Z
Status : Deferred
Published: 2024-12-12T13:15:10.160
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-36494
No data.
OpenCVE Enrichment
No data.