Description
Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allow remote attackers to inject arbitrary web script or HTML via the next_file parameter to (1) main.cgi, (2) img/main.cgi, or (3) adm/file.cgi; or (4) the this_file parameter to adm/file.cgi.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by pagvac · javascriptremotehardware
https://www.exploit-db.com/exploits/32955
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/50224
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/34714
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1173
Exploit x_refsource_misc
http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/34767
Scores
EPSS
0.1385
EPSS Percentile
94.3%
Details
CWE
CWE-79
Status
published
Products (2)
cisco/wvc54gca
1.00r22
cisco/wvc54gca
1.00r24
Published
May 06, 2009
Tracked Since
Feb 18, 2026