The web interface on the Axesstel MV 410R relies on client-side JavaScript code to validate input, which allows remote malicious users to send crafted data, and possibly have unspecified other impact, via a client that does not process JavaScript.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
axesstel mv 410r |