header-logo
Suggest Exploit
vendor:
Tsunami MP.11 2411 Wireless Access Point
by:
SecurityFocus
7.5
CVSS
HIGH
HTML-injection
79
CWE
Product Name: Tsunami MP.11 2411 Wireless Access Point
Affected Version From: Tsunami MP.11 Model 2411
Affected Version To: Tsunami MP.11 Model 2411
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Proxim Tsunami MP.11 2411 Wireless Access Point HTML-injection Vulnerability

The Proxim Tsunami MP.11 2411 Wireless Access Point is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied input data. Attacker-supplied HTML and script code would run in the context of the web interface of the affected device, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to dynamically generate HTML or script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/31666/info

The Proxim Tsunami MP.11 2411 Wireless Access Point is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied input data.

Attacker-supplied HTML and script code would run in the context of the web interface of the affected device, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

This issue is reported in the Tsunami MP.11 Model 2411; additional products may also be vulnerable.

$ snmpset -v1 -c public 192.168.1.100 sysName.0 s&#039;"><script>alert(1)</script>&#039;