"value":"Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts."
"value":"The SEC Consult Vulnerability Lab has published proof of concept material in the technical security advisory.<br>"
}
],
"value":"The SEC Consult Vulnerability Lab has published proof of concept material in the technical security advisory."
}
],
"solution":[
{
"lang":"en",
"supportingMedia":[
{
"base64":false,
"type":"text/html",
"value":"<span style=\"background-color: rgb(255, 255, 255);\">The vendor provides a firmware update to version 7.42B (or higher) which can be downloaded via the vendor's customer server portal.</span><br>"
}
],
"value":"The vendor provides a firmware update to version 7.42B (or higher) which can be downloaded via the vendor's customer server portal."