Description
Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Published: 2019-09-12
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-15553 Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
History

No history.

Subscriptions

Ntt-east Pr-400ki Pr-400ki Firmware Pr-400mi Pr-400mi Firmware Pr-400ne Pr-400ne Firmware Pr-500ki Pr-500ki Firmware Pr-500mi Pr-500mi Firmware Pr-s300hi Pr-s300hi Firmware Pr-s300ne Pr-s300ne Firmware Pr-s300se Pr-s300se Firmware Rs-500ki Rs-500ki Firmware Rs-500mi Rs-500mi Firmware Rt-400ki Rt-400ki Firmware Rt-400mi Rt-400mi Firmware Rt-400ne Rt-400ne Firmware Rt-500ki Rt-500ki Firmware Rt-500mi Rt-500mi Firmware Rt-s300hi Rt-s300hi Firmware Rt-s300ne Rt-s300ne Firmware Rt-s300se Rt-s300se Firmware Rv-440ki Rv-440ki Firmware Rv-440mi Rv-440mi Firmware Rv-440ne Rv-440ne Firmware Rv-s340hi Rv-s340hi Firmware Rv-s340ne Rv-s340ne Firmware Rv-s340se Rv-s340se Firmware
Ntt-west Pr-400ki Pr-400ki Firmware Pr-400mi Pr-400mi Firmware Pr-400ne Pr-400ne Firmware Pr-500ki Pr-500ki Firmware Pr-500mi Pr-500mi Firmware Pr-s300hi Pr-s300hi Firmware Pr-s300ne Pr-s300ne Firmware Pr-s300se Pr-s300se Firmware Rt-400ki Rt-400ki Firmware Rt-400mi Rt-400mi Firmware Rt-400ne Rt-400ne Firmware Rt-500ki Rt-500ki Firmware Rt-500mi Rt-500mi Firmware Rt-s300hi Rt-s300hi Firmware Rt-s300ne Rt-s300ne Firmware Rt-s300se Rt-s300se Firmware Rv-440ki Rv-440ki Firmware Rv-440mi Rv-440mi Firmware Rv-440ne Rv-440ne Firmware Rv-s340hi Rv-s340hi Firmware Rv-s340ne Rv-s340ne Firmware Rv-s340se Rv-s340se Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-08-04T20:09:24.041Z

Reserved: 2019-01-10T00:00:00.000Z

Link: CVE-2019-5985

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-12T17:15:13.920

Modified: 2024-11-21T04:45:51.350

Link: CVE-2019-5985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses