CVE-2014-2045

MEDIUM

Viprinet Multichannel VPN Router 300 - XSS

Title source: llm
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in the old and new interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in the old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool.

Exploits (1)

exploitdb WRITEUP
by Portcullis · textwebappshardware
https://www.exploit-db.com/exploits/39407

References (5)

Core 5
Core References
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/39407/
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/537441/100/0/threaded
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2016/Feb/8

Scores

CVSS v3 6.1
EPSS 0.0434
EPSS Percentile 89.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (2)
viprinet/multichannel_vpn_router_300_firmware 2013070830
viprinet/multichannel_vpn_router_300_firmware 2013080900
Published Jan 20, 2017
Tracked Since Feb 18, 2026