Multiple W&T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage

Project Subscriptions

Vendors Products
At-modem-emulator Subscribe
At-modem-emulator Firmware Subscribe
Com-server 20ma Subscribe
Com-server 20ma Firmware Subscribe
Com-server \+\+ Subscribe
Com-server \+\+ Firmware Subscribe
Com-server Highspeed 100basefx Subscribe
Com-server Highspeed 100basefx Firmware Subscribe
Com-server Highspeed 100baselx Subscribe
Com-server Highspeed 100baselx Firmware Subscribe
Com-server Highspeed 19\" 1port Subscribe
Com-server Highspeed 19\" 1port Firmware Subscribe
Com-server Highspeed 19\" 4port Subscribe
Com-server Highspeed 19\" 4port Firmware Subscribe
Com-server Highspeed Compact Subscribe
Com-server Highspeed Compact Firmware Subscribe
Com-server Highspeed Industry Subscribe
Com-server Highspeed Industry Firmware Subscribe
Com-server Highspeed Isolated Subscribe
Com-server Highspeed Isolated Firmware Subscribe
Com-server Highspeed Lc Subscribe
Com-server Highspeed Lc Firmware Subscribe
Com-server Highspeed Oem Subscribe
Com-server Highspeed Oem Firmware Subscribe
Com-server Highspeed Office 1port Subscribe
Com-server Highspeed Office 1port Firmware Subscribe
Com-server Highspeed Office 4port Subscribe
Com-server Highspeed Office 4port Firmware Subscribe
Com-server Highspeed Poe Subscribe
Com-server Highspeed Poe 3x Isolated Subscribe
Com-server Highspeed Poe 3x Isolated Firmware Subscribe
Com-server Highspeed Poe Firmware Subscribe
Com-server Highspeed Ul Subscribe
Com-server Highspeed Ul Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-45849 Multiple W&T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 29 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-04-29T14:56:50.373Z

Reserved: 2022-10-11T13:32:19.672Z

Link: CVE-2022-42786

cve-icon Vulnrichment

Updated: 2024-08-03T13:19:04.411Z

cve-icon NVD

Status : Modified

Published: 2022-11-10T12:15:10.063

Modified: 2024-11-21T07:25:20.490

Link: CVE-2022-42786

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses