Multiple W&T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage
Project Subscriptions
| Vendors | Products |
|---|---|
|
Wut
Subscribe
|
At-modem-emulator
Subscribe
At-modem-emulator Firmware
Subscribe
Com-server 20ma
Subscribe
Com-server 20ma Firmware
Subscribe
Com-server \+\+
Subscribe
Com-server \+\+ Firmware
Subscribe
Com-server Highspeed 100basefx
Subscribe
Com-server Highspeed 100basefx Firmware
Subscribe
Com-server Highspeed 100baselx
Subscribe
Com-server Highspeed 100baselx Firmware
Subscribe
Com-server Highspeed 19\" 1port
Subscribe
Com-server Highspeed 19\" 1port Firmware
Subscribe
Com-server Highspeed 19\" 4port
Subscribe
Com-server Highspeed 19\" 4port Firmware
Subscribe
Com-server Highspeed Compact
Subscribe
Com-server Highspeed Compact Firmware
Subscribe
Com-server Highspeed Industry
Subscribe
Com-server Highspeed Industry Firmware
Subscribe
Com-server Highspeed Isolated
Subscribe
Com-server Highspeed Isolated Firmware
Subscribe
Com-server Highspeed Lc
Subscribe
Com-server Highspeed Lc Firmware
Subscribe
Com-server Highspeed Oem
Subscribe
Com-server Highspeed Oem Firmware
Subscribe
Com-server Highspeed Office 1port
Subscribe
Com-server Highspeed Office 1port Firmware
Subscribe
Com-server Highspeed Office 4port
Subscribe
Com-server Highspeed Office 4port Firmware
Subscribe
Com-server Highspeed Poe
Subscribe
Com-server Highspeed Poe 3x Isolated
Subscribe
Com-server Highspeed Poe 3x Isolated Firmware
Subscribe
Com-server Highspeed Poe Firmware
Subscribe
Com-server Highspeed Ul
Subscribe
Com-server Highspeed Ul Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-45849 | Multiple W&T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/de/advisories/VDE-2022-043/ |
|
History
Tue, 29 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-04-29T14:56:50.373Z
Reserved: 2022-10-11T13:32:19.672Z
Link: CVE-2022-42786
Updated: 2024-08-03T13:19:04.411Z
Status : Modified
Published: 2022-11-10T12:15:10.063
Modified: 2024-11-21T07:25:20.490
Link: CVE-2022-42786
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD