Description
Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input through the device parameter. Attackers can send POST requests to the QoS devices management endpoint with script payloads in the device parameter to execute arbitrary JavaScript in users' browsers.
Exploits (1)
References (4)
Core 4
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46408
Various Sources product
https://cdome.comodo.com/firewall/
Various Sources product
https://secure.comodo.com/home/purchase.php?pid=106&license=try&track=9278&af=9278
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/comodo-dome-firewall-reflected-cross-site-scripting-via-device-parameter
Scores
CVSS v3
6.1
EPSS
0.0002
EPSS Percentile
6.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
comodo/dome_firewall
< 2.7.0
Published
Feb 19, 2026
Tracked Since
Feb 19, 2026