First published: Fri Aug 20 2021(Updated: )
Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002r Firmware | =1.1.1-b20200824 | |
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-34223 is medium with a CVSS score of 6.1.
CVE-2021-34223 allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824.
The Common Weakness Enumeration (CWE) ID associated with CVE-2021-34223 is CWE-79.
Yes, TOTOLINK A3002R version V1.1.1-B20200824 is vulnerable to CVE-2021-34223.
To fix CVE-2021-34223 in TOTOLINK A3002R version V1.1.1-B20200824, update to a patched version of the firmware provided by TOTOLINK.