Impact
A stored cross‑site scripting (XSS) flaw exists in Edimax GS‑5008PL firmware versions 1.00.54 and earlier. The flaw allows an attacker to send a crafted POST request that sets the sysName parameter to a value containing JavaScript. When a management page that loads system_data.js is subsequently viewed by an administrator, the malicious script is executed in the browser context, giving the attacker the same privileges as the page viewer. Based on the description, it is inferred that an attacker with administrator view access could hijack the session, steal credentials, or alter configuration data.
Affected Systems
The impacted vendor is Edimax Technology Co., Ltd. The product affected is the Edimax GS‑5008PL switch. All firmware builds version 1.00.54 and earlier are eligible for the vulnerability as indicated by the vendor’s product listings and the CPE strings that reference the device and its firmware.
Risk and Exploitability
The CVSS score of 5.1 indicates medium severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to send a crafted POST request to the device’s web interface. The description does not state whether authentication is required; based on typical web‑interface behavior, it is inferred that the attacker must be able to reach the management port, which could be exposed over a local or public network. The attack vector is therefore likely local network or remote if the management interface is externally accessible. The overall risk is moderate, but it could become severe in environments where the switch’s web interface is reachable from untrusted networks or the device is widely shared among administrators.
OpenCVE Enrichment