First published: Thu Jan 09 2020(Updated: )
XSS in the DHCP lease-status table in Billion Smart Energy Router SG600R2 Firmware v3.02.rc6 allows an attacker to inject arbitrary HTML/JavaScript code to achieve client-side code execution via crafted DHCP request packets to etc_ro/web/internet/dhcpcliinfo.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Billion Sg600 R2 Firmware | =3.02-rc6 | |
Billion Sg600 R2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14918 is a vulnerability that allows an attacker to inject arbitrary HTML/JavaScript code to achieve client-side code execution in the Billion Smart Energy Router SG600R2 Firmware v3.02.rc6.
CVE-2019-14918 works by exploiting a cross-site scripting (XSS) vulnerability in the DHCP lease-status table of the Billion Smart Energy Router SG600R2 Firmware. An attacker can inject malicious code into the system via crafted DHCP request packets.
CVE-2019-14918 has a severity rating of 5.4, which is considered medium.
To fix CVE-2019-14918, it is recommended to update the Billion Smart Energy Router SG600R2 Firmware to version 3.02.rc7 or later, which includes a patch for this vulnerability.
More information about CVE-2019-14918 can be found at the following reference link: https://github.com/InnotecSystem/Device-Reversing/wiki/XSS-Injection-via-DHCP-requests