Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/routing.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an authenticated attacker to inject arbitrary JavaScript into the remark field processed by /cgi-bin/routing.cgi. Because the input is stored and subsequently rendered to other users, the injected script executes in the context of those users’ browsers, enabling session hijacking, credential theft, and manipulation of the interface or other malicious actions. The flaw is a classic stored XSS as identified by CWE-79 and is limited to the web interface of affected Endian Firewall installations.

Affected Systems

Endian Firewall products are affected, including all versions 2.1.2, 2.4, 3.3.25 and earlier, as well as the community edition. The issue resides in the /cgi‑bin/routing.cgi script that processes the remark parameter.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1% signals a low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, suggesting no known widespread exploitation. An attacker must be authenticated to the firewall’s web interface to supply the malicious remark, so the attack vector is internal or within the privileged user set. While outright denial of service is not present, the XSS can lead to significant compromise of user sessions and confidentiality when the affected page is rendered.

Generated by OpenCVE AI on April 7, 2026 at 23:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Endian Firewall to the latest version that removes the vulnerable remark processing in /cgi-bin/routing.cgi.
  • If an update cannot be performed immediately, restrict the /cgi-bin/routing.cgi functionality to administrators and monitor for unexpected script content in the remark field.
  • As a temporary measure, configure the web server or the firewall’s input validation to escape or reject any JavaScript content before it is stored in the remark field.

Generated by OpenCVE AI on April 7, 2026 at 23:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Endian firewall Community
CPEs cpe:2.3:a:endian:firewall_community:*:*:*:*:*:*:*:*
Vendors & Products Endian firewall Community

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/routing.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/routing.cgi remark Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Endian Firewall Firewall Community
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T15:45:04.964Z

Reserved: 2026-03-30T20:26:18.724Z

Link: CVE-2026-34798

cve-icon Vulnrichment

Updated: 2026-04-02T15:44:55.496Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T15:16:45.787

Modified: 2026-04-07T15:41:27.247

Link: CVE-2026-34798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:56:06Z

Weaknesses