Multiple cross-site scripting (XSS) vulnerabilities in the old and new interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in the old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2045/ | third party advisory exploit |
https://www.exploit-db.com/exploits/39407/ | third party advisory vdb entry exploit |
http://www.securityfocus.com/archive/1/537441/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/135613/Viprinet-Multichannel-VPN-Router-300-Cross-Site-Scripting.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2016/Feb/8 | third party advisory mailing list |