First published: Tue May 14 2019(Updated: )
An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ricoh SP 4510DN Firmware | ||
Ricoh SP 4510DN Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11845 is an HTML Injection vulnerability that has been discovered on the RICOH SP 4510DN printer.
The HTML Injection vulnerability occurs via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
The severity of CVE-2019-11845 is medium with a CVSS score of 6.1.
To fix the HTML Injection vulnerability, it is recommended to apply the latest firmware update provided by RICOH.
You can find more information about CVE-2019-11845 at the following link: http://packetstormsecurity.com/files/152789/RICOH-SP-4510DN-Printer-HTML-Injection.html