Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Wavlink WL-WN578W2 POST Request login.cgi cross site scripting
Vulnerability Description
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Wavlink WL-WN578W2 代码注入漏洞
Vulnerability Description
Wavlink WL-WN578W2是中国睿因(Wavlink)公司的一款无线中继器。 Wavlink WL-WN578W2 221110版本存在代码注入漏洞,该漏洞源于对POST请求处理组件中文件/cgi-bin/login.cgi的参数homepage/hostname/login_page的错误操作,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A