A cross-site scripting (XSS) vulnerability in the configuration web interface of the Jinan USR IOT USR-WIFI232-S/T/G2/H Low Power WiFi Module with web version 1.2.2 allows attackers to leak credentials of the Wi-Fi access point the module is logged into, and the web interface login credentials, by opening a Wi-Fi access point nearby with a malicious SSID.
References
Link | Resource |
---|---|
https://www.tildeho.me/theres-javascript-in-my-power-plug/ | Exploit Third Party Advisory URL Repurposed |
https://www.tildeho.me/theres-javascript-in-my-power-plug/ | Exploit Third Party Advisory URL Repurposed |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tildeho.me/theres-javascript-in-my-power-plug/ - Exploit, Third Party Advisory, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tildeho.me/theres-javascript-in-my-power-plug/ - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2020-01-06 21:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18842
Mitre link : CVE-2019-18842
CVE.ORG link : CVE-2019-18842
JSON object : View
Products Affected
usriot
- usr-wifi232-g2_firmware
- usr-wifi232-t_firmware
- usr-wifi232-s
- usr-wifi232-g2
- usr-wifi232-h_firmware
- usr-wifi232-s_firmware
- usr-wifi232-t
- usr-wifi232-h
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')