First published: Fri Nov 15 2013(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-2760U | ||
All of | ||
D-Link DSL-2760U Firmware | <1.12 | |
D-Link DSL-2760U | =e1 | |
D-Link DSL-2760U Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5223 is classified with a medium severity due to its potential to allow authenticated users to execute arbitrary scripts.
To fix CVE-2013-5223, update the D-Link DSL-2760U Gateway to the latest firmware version beyond 1.12.
CVE-2013-5223 affects users of the D-Link DSL-2760U Gateway (Rev. E1) running vulnerable firmware versions.
CVE-2013-5223 is categorized as a cross-site scripting (XSS) vulnerability.
Yes, CVE-2013-5223 can be exploited remotely by authenticated users.