Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts.
References
Configurations
No configuration.
History
No history.
Information
Published : 2024-12-12 13:15
Updated : 2025-11-03 22:16
NVD link : CVE-2024-36494
Mitre link : CVE-2024-36494
CVE.ORG link : CVE-2024-36494
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
