A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote malicious user to to modify a web page in the context of a user's browser. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the malicious user to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. Cisco will not release software updates that address this vulnerability. {{value}} ["%7b%7bvalue%7d%7d"])}]]
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco spa500ds firmware - |
||
cisco spa500s firmware - |
||
cisco spa501g firmware - |
||
cisco spa502g firmware - |
||
cisco spa504g firmware - |
||
cisco spa508g firmware - |
||
cisco spa509g firmware - |
||
cisco spa512g firmware - |
||
cisco spa514g firmware - |
||
cisco spa525 firmware - |
||
cisco spa525g firmware - |
||
cisco spa525g2 firmware - |