First published: Fri Aug 20 2021(Updated: )
Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Service Name" field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002r Firmware | =1.1.1-b20200824 | |
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34215.
The severity level of CVE-2021-34215 is medium (6.1).
The affected software version of CVE-2021-34215 is Totolink A3002R Firmware version 1.1.1-B20200824.
An attacker can exploit CVE-2021-34215 by modifying the "Service Name" field in tcpipwan.htm, allowing them to execute arbitrary JavaScript.
No, TOTOLINK A3002R is not vulnerable to CVE-2021-34215.