CVE-2019-11017

MEDIUM

Dlink Di-524 Firmware - XSS

Title source: rule
STIX 2.1

Description

On D-Link DI-524 V2.06RU devices, multiple Stored and Reflected XSS vulnerabilities were found in the Web Configuration: /spap.htm, /smap.htm, and /cgi-bin/smap, as demonstrated by the cgi-bin/smap RC parameter.

Exploits (1)

exploitdb WRITEUP
by Semen Alexandrovich Lyhin · textwebappshardware
https://www.exploit-db.com/exploits/46687

References (2)

Core 2
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/152465/D-Link-DI-524-2.06RU-Cross-Site-Scripting.html
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/46687

Scores

CVSS v3 4.8
EPSS 0.0102
EPSS Percentile 77.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-79
Status published
Products (1)
dlink/di-524_firmware 2.06ru
Published Apr 18, 2019
Tracked Since Feb 18, 2026