First published: Thu Sep 07 2017(Updated: )
XSS (persistent) on the Intelbras Wireless N 150Mbps router with firmware WRN 240 allows attackers to steal wireless credentials without being connected to the network, related to userRpm/popupSiteSurveyRpm.htm and userRpm/WlanSecurityRpm.htm. The attack vector is a crafted ESSID, as demonstrated by an "airbase-ng -e" command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intelbras Wrn 240 Firmware | ||
Intelbras Wrn 240 | ||
All of | ||
Intelbras Wrn 240 Firmware | ||
Intelbras Wrn 240 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14219 has a medium severity level due to its ability to facilitate credential theft via persistent cross-site scripting.
To fix CVE-2017-14219, update the Intelbras WRN 240 firmware to a version that addresses this vulnerability.
CVE-2017-14219 affects users of the Intelbras WRN 240 router running the vulnerable firmware.
CVE-2017-14219 is associated with persistent cross-site scripting (XSS) attacks that can allow remote credential theft.
The attack vector for CVE-2017-14219 involves using a crafted ESSID to exploit the router's web interface.