Impact
The vulnerability allows an authenticated user to inject arbitrary JavaScript through the NAME parameter of /cgi-bin/uplinkeditor.cgi. The injected script is stored and executed whenever other users load the affected page, enabling potential session hijacking, data theft, or defacement in the web interface. This is a classic stored XSS flaw classified as CWE‑79.
Affected Systems
The problem exists in Endian Firewall products, including the standard Enterprise Edition and the Community edition, for all releases 3.3.25 and earlier as well as 2.1.2, 2.4, and other prior versions listed in the CPE entries.
Risk and Exploitability
With a CVSS score of 5.1, the vulnerability is considered moderate in severity. The EPSS score is below 1 %, indicating a low likelihood of exploitation. No known public exploits are recorded in the KEV catalog. The attack vector is inferred to require authenticated access to the system, typically meaning the attacker must be a legitimate administrator or otherwise have valid user credentials.
OpenCVE Enrichment