U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-25034

Change History

CVE Modified by VulDB 12/25/2022 11:15:10 AM

Action Type Old Value New Value
Added CVSS V3

								
							
							
						
VulDB AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Removed CVSS V3.1
VulDB AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

								
						
Removed CVSS V3.1 Reason
C-No limiting factors

								
						
Removed CVSS V3.1 Reason
S-Security boundary

								
						
Changed Description
A vulnerability, which was classified as problematic, has been found in Thomson TCW710 ST5D.10.05. This issue affects some unknown processing of the file /goform/wlanPrimaryNetwork. The manipulation of the argument ServiceSetIdentifier with the input ><script>alert(1)</script> as part of POST Request leads to cross site scripting (Persistent). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
A vulnerability, which was classified as problematic, has been found in Thomson TCW710 ST5D.10.05. This issue affects some unknown processing of the file /goform/wlanPrimaryNetwork. The manipulation of the argument ServiceSetIdentifier with the input ><script>alert(1)</script> as part of POST Request leads to basic cross site scripting (Persistent). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-126695.
Added Reference

								
							
							
						
https://vuldb.com/?ctiid.126695 [No Types Assigned]