D-Link DIR-655 C devices before 3.02B05 BETA03 allow XSS, as demonstrated by the /www/ping_response.cgi ping_ipaddr parameter, the /www/ping6_response.cgi ping6_ipaddr parameter, and the /www/apply_sec.cgi html_response_return_page parameter.
References
Link | Resource |
---|---|
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-655/REVC/DIR-655_REVC_RELEASE_NOTES_v3.02B05_BETA03.pdf | Third Party Advisory |
https://www.nccgroup.trust/contentassets/7188fe7f130846ffa31827fc1661d120/crosssitescripting.txt | Third Party Advisory |
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/july/the-d-link-dir-655c-from-nothing-to-rce/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-11T14:59:27
Updated: 2019-07-11T14:59:27
Reserved: 2019-07-11T00:00:00
Link: CVE-2019-13562
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-11T15:15:11.660
Modified: 2019-07-12T15:04:52.917
Link: CVE-2019-13562
JSON object: View
Redhat Information
No data.
CWE