Search

IQID:8336 HTTP D-Link 2760N ddnsmngr.cmd username Parameter Reflected XSS Vulnerability S

get in touch

Latest News

IQID:8336 HTTP D-Link 2760N ddnsmngr.cmd username Parameter Reflected XSS Vulnerability S

IQID: 8336 - December 2013

Multiple successful remote cross-site scripting attacks against D-Link DSL-2760U Gateway (Rev. E1) via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.

A Full Description is available for this threat, please sign in for access to Full Description.


 

Attack Data

Attack Data is available for this threat, please sign in for access to Attack Data.


 

CVSS Information

CVSS Information is available for this threat, please sign in for access to CVSS Information.


 

Date

Date Information is available for this threat, please sign in for access to Date Information.


 

External Resources

External resources are available for this threat, please sign in for access to external resources.


 

Security Rule

A security rule is available to identify this threat, please sign in for access to security rules.


 

Permalink

Link directly to this page.

http://www.idappcom.com/db/?8336


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.