Impact
The vulnerability allows an authenticated administrator to store arbitrary JavaScript in the remark parameter of /cgi-bin/dnat.cgi. The stored script is then rendered when other users load the affected page, enabling malicious code execution in their browsers. This flaw is classified as a stored cross‑site scripting (XSS) vulnerability (CWE‑79).
Affected Systems
Endian Firewall versions 3.3.25 and all earlier releases are affected, including the 2.1.2 series, the 2.4 line, and the 3.3.25 release.
Risk and Exploitability
The CVSS score is 5.1, indicating medium severity, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access to the firewall’s administrative interface; an attacker must submit a malicious remark string that is stored and later displayed to other users, causing the injected script to execute in their browsers.
OpenCVE Enrichment