漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Wavlink WL-WN578W2 POST Request login.cgi cross site scripting
Vulnerability Description
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Wavlink WL-WN578W2 代码注入漏洞
Vulnerability Description
Wavlink WL-WN578W2是中国睿因(Wavlink)公司的一款无线中继器。 Wavlink WL-WN578W2 221110版本存在代码注入漏洞,该漏洞源于对POST请求处理组件中文件/cgi-bin/login.cgi的参数homepage/hostname/login_page的错误操作,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A