A cross-site scripting (XSS) vulnerability in the configuration web interface of the Jinan USR IOT USR-WIFI232-S/T/G2/H Low Power WiFi Module with web version 1.2.2 allows attackers to leak credentials of the Wi-Fi access point the module is logged into, and the web interface login credentials, by opening a Wi-Fi access point nearby with a malicious SSID.
References
Link | Resource |
---|---|
https://www.tildeho.me/theres-javascript-in-my-power-plug/ | Exploit Third Party Advisory URL Repurposed |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2020-01-06 21:15
Updated : 2024-02-14 01:17
NVD link : CVE-2019-18842
Mitre link : CVE-2019-18842
CVE.ORG link : CVE-2019-18842
JSON object : View
Products Affected
usriot
- usr-wifi232-g2_firmware
- usr-wifi232-s_firmware
- usr-wifi232-t
- usr-wifi232-h
- usr-wifi232-h_firmware
- usr-wifi232-g2
- usr-wifi232-t_firmware
- usr-wifi232-s
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')