D-Link DIR-655 C devices before 3.02B05 BETA03 allow XSS, as demonstrated by the /www/ping_response.cgi ping_ipaddr parameter, the /www/ping6_response.cgi ping6_ipaddr parameter, and the /www/apply_sec.cgi html_response_return_page parameter.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/july/the-d-link-dir-655c-from-nothing-to-rce/ | Exploit Third Party Advisory |
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-655/REVC/DIR-655_REVC_RELEASE_NOTES_v3.02B05_BETA03.pdf | Third Party Advisory |
https://www.nccgroup.trust/contentassets/7188fe7f130846ffa31827fc1661d120/crosssitescripting.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-07-11 08:15
Updated : 2019-07-12 08:04
NVD link : CVE-2019-13562
Mitre link : CVE-2019-13562
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
dlink
- dir-655_firmware
- dir-655