Description
Reflected XSS in Medintux v2.16.000 CCAM.php by manipulating the mot1 parameter can result in an attacker performing malicious actions to users who open a maliciously crafted link or third-party web page.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability
Third Party Advisory x_refsource_misc
https://emreovunc.com/blog/en/Medintux-v2.16.000-Reflected-XSS-02.png
Exploit, Third Party Advisory x_refsource_misc
https://emreovunc.com/blog/en/Medintux-v2.16.000-Reflected-XSS-01.png
Scores
CVSS v3
6.1
EPSS
0.0036
EPSS Percentile
58.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
medintux/medintux
2.16.000
Published
Jan 20, 2021
Tracked Since
Feb 18, 2026