Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-5223
Deferred
Known KEV
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 Nov, 2013 | 04:50
Updated At-11 Apr, 2025 | 00:51

Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-03-252022-04-15D-Link DSL-2760U Gateway Cross-Site Scripting VulnerabilityApply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Secondary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Primary2.03.5LOW
AV:N/AC:M/Au:S/C:N/I:P/A:N
CPE Matches

D-Link Corporation
dlink
>>dsl-2760u_firmware>>Versions before 1.12(exclusive)
cpe:2.3:o:dlink:dsl-2760u_firmware:*:*:*:*:*:*:*:*
D-Link Corporation
dlink
>>dsl-2760u>>e1
cpe:2.3:h:dlink:dsl-2760u:e1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE-79Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/99603cve@mitre.org
Broken Link
http://osvdb.org/99604cve@mitre.org
Broken Link
http://osvdb.org/99605cve@mitre.org
Broken Link
http://osvdb.org/99606cve@mitre.org
Broken Link
http://osvdb.org/99607cve@mitre.org
Broken Link
http://osvdb.org/99608cve@mitre.org
Broken Link
http://osvdb.org/99609cve@mitre.org
Broken Link
http://osvdb.org/99610cve@mitre.org
Broken Link
http://osvdb.org/99611cve@mitre.org
Broken Link
http://osvdb.org/99612cve@mitre.org
Broken Link
http://osvdb.org/99613cve@mitre.org
Broken Link
http://osvdb.org/99615cve@mitre.org
Broken Link
http://osvdb.org/99616cve@mitre.org
Broken Link
http://packetstormsecurity.com/files/123976cve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2013/Nov/76cve@mitre.org
Exploit
Mailing List
Third Party Advisory
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/88723cve@mitre.org
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/88724cve@mitre.org
Third Party Advisory
VDB Entry
http://osvdb.org/99603af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99604af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99605af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99606af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99607af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99608af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99609af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99610af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99611af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99612af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99613af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99615af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99616af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://packetstormsecurity.com/files/123976af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2013/Nov/76af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
Third Party Advisory
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/88723af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/88724af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found