CVE-2013-5223
Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.
Published
2013-11-19T04:50:12.063
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 5.4 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:S/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: SINGLE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
6.8
Impact Score
2.9
Weaknesses
-
Type: Primary
CWE-79
-
Type: Secondary
CWE-79
Affected Vendors & Products
References
-
http://osvdb.org/99603
Broken Link
([email protected])
-
http://osvdb.org/99604
Broken Link
([email protected])
-
http://osvdb.org/99605
Broken Link
([email protected])
-
http://osvdb.org/99606
Broken Link
([email protected])
-
http://osvdb.org/99607
Broken Link
([email protected])
-
http://osvdb.org/99608
Broken Link
([email protected])
-
http://osvdb.org/99609
Broken Link
([email protected])
-
http://osvdb.org/99610
Broken Link
([email protected])
-
http://osvdb.org/99611
Broken Link
([email protected])
-
http://osvdb.org/99612
Broken Link
([email protected])
-
http://osvdb.org/99613
Broken Link
([email protected])
-
http://osvdb.org/99615
Broken Link
([email protected])
-
http://osvdb.org/99616
Broken Link
([email protected])
-
http://packetstormsecurity.com/files/123976
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://seclists.org/fulldisclosure/2013/Nov/76
Exploit, Mailing List, Third Party Advisory
([email protected])
-
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002
Vendor Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/88723
Third Party Advisory, VDB Entry
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/88724
Third Party Advisory, VDB Entry
([email protected])
-
http://osvdb.org/99603
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99604
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99605
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99606
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99607
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99608
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99609
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99610
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99611
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99612
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99613
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99615
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/99616
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/123976
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/fulldisclosure/2013/Nov/76
Exploit, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/88723
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/88724
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)