EnGenius ESR580 A8J-EMR5000 devices allow a remote...
Moderate severity
Unreviewed
Published
Oct 30, 2024
to the GitHub Advisory Database
•
Updated Oct 31, 2024
Description
Published by the National Vulnerability Database
Oct 30, 2024
Published to the GitHub Advisory Database
Oct 30, 2024
Last updated
Oct 31, 2024
EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest.
References