Description
Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the NAME parameter to /cgi-bin/uplinkeditor.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Stored cross‑site scripting that executes arbitrary JavaScript in users’ browsers
Action: Update Firmware
AI Analysis

Impact

Endian Firewall versions through 3.3.25 contain a stored cross‑site scripting flaw in /cgi-bin/uplinkeditor.cgi that accepts an unchecked NAME parameter. An attacker with authenticated access can embed arbitrary JavaScript that gets saved into the firewall configuration. When any other authorized user later views the affected page, the stored script executes in their browser, potentially allowing session hijacking, credential theft, or malicious page redirection.

Affected Systems

The affected products are Endian Firewall releases 2.1.2, 2.4, and 3.3.25, as well as any earlier 3.3.x line that predates the fix. Administrators operating these firmware versions are at risk, while versions greater than 3.3.25 are expected to have the issue resolved. Users who have the ability to access the web interface are also exposed if they interact with the vulnerable page.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the lack of a CISA KEV listing suggests that public exploitation is not widespread. Exploitation requires authentication to the web console, reducing the attack surface compared to an unauthenticated vulnerability. Once authenticated, the attacker can inject payloads with no additional privileges, and the impact is limited to the browsers of users who subsequently load the malicious page. Because EPSS data is unavailable, the precise likelihood of real‑world exploitation remains uncertain, but the need for legitimate credentials mitigates widespread risk.

Generated by OpenCVE AI on April 2, 2026 at 17:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Endian Firewall firmware (newer than 3.3.25).
  • If upgrade is pending, restrict /cgi-bin/uplinkeditor.cgi to authorized admin users and disable the NAME parameter or its persistence where possible.
  • Implement input validation or a web application firewall to block XSS payloads from being stored.
  • Enforce multi‑factor authentication on administrative accounts.
  • Regularly review audit logs for suspicious input attempts and respond promptly.

Generated by OpenCVE AI on April 2, 2026 at 17:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the NAME parameter to /cgi-bin/uplinkeditor.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.
Title Endian Firewall /cgi-bin/uplinkeditor.cgi NAME Stored Cross-Site Scripting
First Time appeared Endian
Endian firewall
Weaknesses CWE-79
CPEs cpe:2.3:a:endian:firewall:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:2.4:*:*:*:*:*:*:*
cpe:2.3:a:endian:firewall:3.3.25:*:*:*:*:*:*:*
Vendors & Products Endian
Endian firewall
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-02T18:41:03.160Z

Reserved: 2026-03-30T20:26:18.725Z

Link: CVE-2026-34800

cve-icon Vulnrichment

Updated: 2026-04-02T18:40:59.051Z

cve-icon NVD

Status : Received

Published: 2026-04-02T15:16:46.267

Modified: 2026-04-02T15:16:46.267

Link: CVE-2026-34800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:20:43Z

Weaknesses