### [CVE-2018-19394](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19394) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file. ### POC #### Reference - https://cyberskr.com/blog/cobham-satcom-800-900.html - https://cyberskr.com/blog/cobham-satcom-800-900.html #### Github No PoCs found on GitHub currently.