### [CVE-2018-25035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25035) ![](https://img.shields.io/static/v1?label=Product&message=TCW710&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%20Basic%20Cross%20Site%20Scripting&color=brighgreen) ### Description A vulnerability, which was classified as problematic, was found in Thomson TCW710 ST5D.10.05. Affected is an unknown function of the file /goform/RGFirewallEL. The manipulation of the argument EmailAddress/SmtpServerName with the input > as part of POST Request leads to cross site scripting (Persistent). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. ### POC #### Reference - https://vuldb.com/?id.126696 #### Github No PoCs found on GitHub currently.