Description
Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a stored cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by manipulating the Device Location field. Attackers can inject malicious scripts through the System Status interface that execute in browsers of users viewing the status page without input sanitation.
Published: 2026-03-16
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting via device location
Action: Patch Firmware
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw (CWE‑79) in the Hereta ETH‑IMC408M firmware version 1.0.15 and earlier, allowing an authenticated attacker to inject arbitrary JavaScript by editing the Device Location field through the System Status interface. Because the input is not sanitized, the malicious script executes in the browsers of any user who views the status page, potentially enabling defacement, data exfiltration, or session hijack within the web portal.

Affected Systems

Shenzhen Hereta Technology has issued this advisory for its ETH‑IMC408M wireless intrusion detection system. The flaw affects firmware versions 1.0.15 and older, exposing devices running these releases to the described injection.

Risk and Exploitability

The CVSS base score of 5.1 places the vulnerability in the medium severity range. Exploitability appears low, with an EPSS score below 1 percent, and the issue is not listed in CISA's KEV catalog. The flaw requires authentication to the device’s web interface, so an attacker must first obtain valid credentials or compromise the network the device resides on; once authenticated, injected scripts run automatically when the status page is accessed, limiting the risk to environments with exposed web interfaces and weak access controls.

Generated by OpenCVE AI on April 10, 2026 at 18:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update that removes the vulnerability
  • Restrict or disable access to the System Status interface on untrusted networks
  • Enforce strong, unique credentials for the device’s web interface
  • Monitor web‑interface logins for anomalous activity

Generated by OpenCVE AI on April 10, 2026 at 18:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Hereta
Hereta eth-imc408m
Hereta eth-imc408m Firmware
CPEs cpe:2.3:h:hereta:eth-imc408m:-:*:*:*:*:*:*:*
cpe:2.3:o:hereta:eth-imc408m_firmware:*:*:*:*:*:*:*:*
Vendors & Products Hereta
Hereta eth-imc408m
Hereta eth-imc408m Firmware

Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Hereta Technology
Shenzhen Hereta Technology hereta Eth-imc408m
Vendors & Products Shenzhen Hereta Technology
Shenzhen Hereta Technology hereta Eth-imc408m

Mon, 16 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a stored cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by manipulating the Device Location field. Attackers can inject malicious scripts through the System Status interface that execute in browsers of users viewing the status page without input sanitation.
Title Hereta ETH-IMC408M Stored XSS via Device Location
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Hereta Eth-imc408m Eth-imc408m Firmware
Shenzhen Hereta Technology Hereta Eth-imc408m
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-17T15:29:07.351Z

Reserved: 2026-03-04T15:39:26.872Z

Link: CVE-2026-29513

cve-icon Vulnrichment

Updated: 2026-03-16T18:09:49.342Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T18:16:08.190

Modified: 2026-04-10T17:44:34.403

Link: CVE-2026-29513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:28:29Z

Weaknesses