A vulnerability, which was classified as problematic, has been found in Thomson TCW710 ST5D.10.05. This issue affects some unknown processing of the file /goform/wlanPrimaryNetwork. The manipulation of the argument ServiceSetIdentifier with the input ><script>alert(1)</script> as part of POST Request leads to basic cross site scripting (Persistent). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-126695.
References
Link Resource
https://alquimistadesistemas.com/auditando-router-thomson-tcw710 Exploit Third Party Advisory
https://vuldb.com/?ctiid.126695 Third Party Advisory
https://vuldb.com/?id.126695 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2022-06-12T07:40:19

Updated: 2022-12-25T15:23:51.173Z

Reserved: 2022-06-04T00:00:00


Link: CVE-2018-25034

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-06-12T08:15:07.057

Modified: 2024-05-17T01:27:25.100


Link: CVE-2018-25034

JSON object: View

cve-icon Redhat Information

No data.