Description
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior reflect unsanitized user input in the web interface, allowing an attacker to inject and execute arbitrary JavaScript in the context of an authenticated user.
Published: 2026-02-24
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑Side Cross‑Site Scripting with authenticated user context
Action: Update firmware
AI Analysis

Impact

The flaw exists in the web interface of the Binardat 10G08‑0800GSM network switch, where user input is not properly sanitized. This allows an attacker who has authenticated access to inject and execute arbitrary JavaScript in the context of that session.

Affected Systems

Devices running firmware V300SP10260209 or earlier of the Binardat 10G08‑0800GSM network switch are affected.

Risk and Exploitability

The CVSS base score of 5.1 indicates a moderate impact, while the EPSS score of less than 1 % demonstrates a very low current likelihood of exploitation. The vulnerability is not listed in the KEV catalog, suggesting no publicly known exploits. Successful exploitation requires valid credentials and access to the web UI, classifying it as an authenticated XSS.

Generated by OpenCVE AI on April 17, 2026 at 15:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device to the latest firmware version that includes input‑sanitization fixes
  • Restrict the switch’s web interface to trusted IPs or a protected network segment to limit exposure
  • If supported, enable a content‑security‑policy header or similar mitigation to reduce the impact of any remaining XSS vector

Generated by OpenCVE AI on April 17, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware
CPEs cpe:2.3:h:binardat:10g08-0800gsm:-:*:*:*:*:*:*:*
cpe:2.3:o:binardat:10g08-0800gsm_firmware:*:*:*:*:*:*:*:*
Vendors & Products Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Binardat
Binardat 10g08-0800gsm Network Switch
Vendors & Products Binardat
Binardat 10g08-0800gsm Network Switch

Tue, 24 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior reflect unsanitized user input in the web interface, allowing an attacker to inject and execute arbitrary JavaScript in the context of an authenticated user.
Title Binardat 10G08-0800GSM Network Switch XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Binardat 10g08-0800gsm 10g08-0800gsm Firmware 10g08-0800gsm Network Switch
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T14:49:41.663Z

Reserved: 2026-02-19T19:51:07.328Z

Link: CVE-2026-27517

cve-icon Vulnrichment

Updated: 2026-02-26T18:20:51.948Z

cve-icon NVD

Status : Modified

Published: 2026-02-24T16:24:09.207

Modified: 2026-03-02T15:16:37.203

Link: CVE-2026-27517

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses