TROYANOSYVIRUS
Volver a CVEs

CVE-2013-5223

MEDIUMCISA KEV
5.4

Descripcion

Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.

Detalles CVE

Puntuacion CVSS v3.15.4
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioREQUIRED
Publicado11/19/2013
Ultima modificacion4/22/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorD-Link
ProductoDSL-2760U
Nombre vulnerabilidadD-Link DSL-2760U Gateway Cross-Site Scripting Vulnerability
Fecha inclusion KEV2022-03-25
Fecha limite remediacion2022-04-15
Uso en ransomwareUnknown

Productos afectados

dlink:dsl-2760udlink:dsl-2760u_firmware

Debilidades (CWE)

CWE-79CWE-79

Referencias

http://osvdb.org/99603(cve@mitre.org)
http://osvdb.org/99604(cve@mitre.org)
http://osvdb.org/99605(cve@mitre.org)
http://osvdb.org/99606(cve@mitre.org)
http://osvdb.org/99607(cve@mitre.org)
http://osvdb.org/99608(cve@mitre.org)
http://osvdb.org/99609(cve@mitre.org)
http://osvdb.org/99610(cve@mitre.org)
http://osvdb.org/99611(cve@mitre.org)
http://osvdb.org/99612(cve@mitre.org)
http://osvdb.org/99613(cve@mitre.org)
http://osvdb.org/99615(cve@mitre.org)
http://osvdb.org/99616(cve@mitre.org)
http://osvdb.org/99603(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99604(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99605(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99606(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99607(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99608(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99609(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99610(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99611(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99612(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99613(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99615(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/99616(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/123976(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2013/Nov/76(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.