Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
Vulnerability Type:
Cross Site Scripting (XSS)
⬤ Additional Information:
https://github.com/Gr3gPr1est/BugReport/blob/master/SAGEM_F%
40ST3686_v1.0_HUN_3.97.0_XSS_Vuln..pdf
⬤ Affected Component:
RgDiagnostics.asp, RgDdns.asp, RgFirewallEL.asp,
RgVpnL2tpPptp.asp
⬤ Attack Typeo: Remote
⬤ Impact Code execution: true
⬤ Attack Vectors:
The SagemCom router RgDiagnostics.asp, RgDdns.asp,
RgFirewallEL.asp, RgVpnL2tpPptp.asp vulnerable to XSS.
⬤ Reference:
http://sagemcom.com http://sagemcomfst3686v10hun3970.com
https://github.com/Gr3gPr1est/BugReport/blob/master/SAGEM_F%
40ST3686_v1.0_HUN_3.97.0_XSS_Vuln..pdf
⬤ Vendor of Product:
Sagemcom
⬤ Affected Product Code Base:
SAGEMCOM_F@ST3686_v1.0_HUN_3.97.0 v1.0 HUN 3.97.0
⬤ Suggested description:
Sagemcom F@ST3686 v1.0 HUN 3.97.0 v1.0 HUN 3.97.0 has XSS) via RgDiagnostics.asp, RgDdns.asp, RgFirewallEL.asp, RgVpnL2tpPptp.asp.
sub.zer0d4y@gmail.com
Use CVE-2020-21733 for this vulnerability.