A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected application that could allow an malicious user to execute malicious javascript code by tricking users into accessing a malicious link. The malformed value is reflected directly in the response without sanitization while throwing an “invalid path” error.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
siemens ruggedcom rox mx5000 firmware |
||
siemens ruggedcom rox mx5000re firmware |
||
siemens ruggedcom rox rx1400 firmware |
||
siemens ruggedcom rox rx1500 firmware |
||
siemens ruggedcom rox rx1501 firmware |
||
siemens ruggedcom rox rx1510 firmware |
||
siemens ruggedcom rox rx1511 firmware |
||
siemens ruggedcom rox rx1512 firmware |
||
siemens ruggedcom rox rx1524 firmware |
||
siemens ruggedcom rox rx1536 firmware |
||
siemens ruggedcom rox rx5000 firmware |