D-Link DSL-2740E 1.00_BG_20150720 devices are prone to persistent XSS attacks in the username and password fields: a remote unauthenticated user may craft logins and passwords with script tags in them. Because there is no sanitization in the input fields, an unaware logged-in administrator may be a victim when checking the router logs.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101622 | Third Party Advisory VDB Entry |
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-018/?fid=8411 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Apr 2023, 19:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:d-link:dsl-2740e_firmware:1.00_bg_20150720:*:*:*:*:*:*:* |
cpe:2.3:o:dlink:dsl-2740e_firmware:1.00_bg_20150720:*:*:*:*:*:*:* cpe:2.3:h:dlink:dsl-2740e:-:*:*:*:*:*:*:* |
Information
Published : 2017-10-31 07:29
Updated : 2024-02-04 19:29
NVD link : CVE-2016-10699
Mitre link : CVE-2016-10699
CVE.ORG link : CVE-2016-10699
JSON object : View
Products Affected
dlink
- dsl-2740e
- dsl-2740e_firmware
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')