A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote malicious user to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the malicious user to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]]
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco spa500ds_firmware - |
||
cisco spa500s_firmware - |
||
cisco spa501g_firmware - |
||
cisco spa502g_firmware - |
||
cisco spa504g_firmware - |
||
cisco spa508g_firmware - |
||
cisco spa509g_firmware - |
||
cisco spa512g_firmware - |
||
cisco spa514g_firmware - |
||
cisco spa525_firmware - |
||
cisco spa525g_firmware - |
||
cisco spa525g2_firmware - |