vendor:
DSL-G624T
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: DSL-G624T
Affected Version From: D-Link DSL-G624T firmware versions prior to the patched version
Affected Version To: D-Link DSL-G624T firmware versions prior to the patched version
Patch Exists: YES
Related CWE: CVE-2007-1525
CPE: h:d-link:dsl-g624t
Platforms Tested:
2007
Cross-Site Scripting Vulnerability in D-Link DSL-G624T
The D-Link DSL-G624T router is prone to a cross-site scripting vulnerability. The issue occurs due to a failure to properly sanitize user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, within the context of the affected site. This can potentially lead to the theft of cookie-based authentication credentials and facilitate other malicious activities.
Mitigation:
To mitigate this vulnerability, users are advised to update to the latest firmware version provided by D-Link. Additionally, it is recommended to disable remote management and restrict access to the router's administration interface to trusted networks or IP addresses.