发布时间 :2004-12-31 00:00:00
修订时间 :2017-07-10 21:31:21

[原文]Cross-site scripting (XSS) vulnerability in the web management interface in Edimax AR-6004 ADSL Routers allows remote attackers to inject arbitrary web script or HTML via the URL.

[CNNVD]Edimax AR-6004 ADSL路由器管理界面跨站脚本漏洞(CNNVD-200412-714)

        Edimax AR-6004 ADSL Routers的web管理界面存在跨站脚本(XSS)漏洞。远程攻击者借助URL注入任意web脚本。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20040106 EDIMAX AR-6004 Full Rate ADSL Router Cross Site Scripting Vulnerabillity
(UNKNOWN)  BID  9374
(UNKNOWN)  XF  edimax-ar6004-xss(14165)

- 漏洞信息

Edimax AR-6004 ADSL路由器管理界面跨站脚本漏洞
中危 跨站脚本
2004-12-31 00:00:00 2005-10-20 00:00:00
        Edimax AR-6004 ADSL Routers的web管理界面存在跨站脚本(XSS)漏洞。远程攻击者借助URL注入任意web脚本。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: .

- 漏洞信息 (23528)

Edimax AR-6004 ADSL Router Management Interface Cross-Site Scripting Vulnerability (EDBID:23528)
hardware remote
2004-01-06 Verified
0 Rafel Ivgi
N/A [点击下载]

Edimax AR-6004 ADSL Routers are prone to cross-site scripting attacks via the web management interface of affected devices. An attacker could exploit this issue by enticing a victim user to follow a malicious link to a site hosting the software that contains embedded HTML and script code. The embedded code may be rendered in the web browser of the victim user.

This could potentially be exploited to steal cookie-based authentication credentials from legitimate users. Other attacks are also possible.<script>alert('XSS')</script>		

- 漏洞信息

Edimax AR-6004 Broadband Router XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Edimax AR-6004 Broadband Router contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user supplied input upon submission. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-01-08 2004-01-06
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

Unknown or Incomplete