### [CVE-2024-55040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55040) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Cross Site Scripting vulnerability in Sensaphone WEB600 Monitoring System v.1.6.5.H and before allows a remote attacker to execute arbitrary code via a crafted GET requests to /@.xml, placing payloads in the g7200, g7300, g4601, and g1F02 parameters. ### POC #### Reference - https://github.com/tcbutler320/Sensaphone-WEB600-XSS #### Github - https://github.com/tcbutler320/CVE-2024-55040-Sensaphone-XSS