Multiple cross-site scripting (XSS) vulnerabilities in the old and new interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in the old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2016/Feb/8 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/537441/100/0/threaded | |
https://www.exploit-db.com/exploits/39407/ | Exploit Third Party Advisory VDB Entry |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2045/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-01-20 15:59
Updated : 2024-02-04 19:11
NVD link : CVE-2014-2045
Mitre link : CVE-2014-2045
CVE.ORG link : CVE-2014-2045
JSON object : View
Products Affected
viprinet
- multichannel_vpn_router_300
- multichannel_vpn_router_300_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')