CVE-2022-45028: n/a in n/a
A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha.
AI Analysis
Technical Summary
CVE-2022-45028 is a cross-site scripting (XSS) vulnerability identified in the Arris NVG443B router firmware version 9.3.0h3d36. The vulnerability arises due to improper sanitization of user-supplied input in the web management interface, specifically when processing POST requests sent to the /cgi-bin/logs.ha endpoint. An attacker can exploit this flaw by crafting a malicious POST request containing executable JavaScript or HTML code. When the router's web interface processes this request, the injected script executes in the context of the victim's browser session. This can lead to unauthorized actions such as session hijacking, credential theft, or the manipulation of router settings through the victim's authenticated session. The vulnerability has a CVSS v3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R), such as the victim visiting a malicious page or clicking a link that triggers the crafted POST request. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked, suggesting that mitigation may rely on configuration changes or vendor updates when available. The vulnerability falls under CWE-79, a common web application security weakness related to improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations, the exploitation of this XSS vulnerability on Arris NVG443B routers could lead to unauthorized access to router management interfaces, potentially allowing attackers to alter network configurations, redirect traffic, or intercept sensitive data. While the direct impact on availability is negligible, the compromise of router integrity and confidentiality can facilitate further attacks within the network, such as man-in-the-middle attacks or lateral movement. Organizations relying on these routers for critical network infrastructure, especially in small to medium enterprises or home office environments, may face increased risk of data leakage or network manipulation. The requirement for user interaction limits large-scale automated exploitation but does not eliminate targeted attacks, particularly spear-phishing or social engineering campaigns aimed at network administrators or users with access to the router interface. Given the router's role as a gateway device, successful exploitation could undermine perimeter security, affecting the confidentiality and integrity of internal communications and data.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's web management interface to trusted networks only, ideally via VPN or secure management VLANs, to prevent exposure to untrusted users. 2. Disable remote management features if not strictly necessary, reducing the attack surface. 3. Implement strict input validation and sanitization on the router's web interface if vendor updates or patches become available; monitor vendor advisories for firmware updates addressing this vulnerability. 4. Employ network-level protections such as web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious POST requests targeting /cgi-bin/logs.ha. 5. Educate users and administrators about the risks of interacting with unsolicited links or web content that could trigger malicious POST requests, emphasizing cautious behavior to mitigate user interaction requirements. 6. Regularly audit router configurations and logs for signs of unauthorized access or anomalous POST requests. 7. Consider replacing or upgrading affected hardware if vendor support is discontinued or patches are unavailable, to ensure long-term security.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-45028: n/a in n/a
Description
A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha.
AI-Powered Analysis
Technical Analysis
CVE-2022-45028 is a cross-site scripting (XSS) vulnerability identified in the Arris NVG443B router firmware version 9.3.0h3d36. The vulnerability arises due to improper sanitization of user-supplied input in the web management interface, specifically when processing POST requests sent to the /cgi-bin/logs.ha endpoint. An attacker can exploit this flaw by crafting a malicious POST request containing executable JavaScript or HTML code. When the router's web interface processes this request, the injected script executes in the context of the victim's browser session. This can lead to unauthorized actions such as session hijacking, credential theft, or the manipulation of router settings through the victim's authenticated session. The vulnerability has a CVSS v3.1 base score of 6.1, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R), such as the victim visiting a malicious page or clicking a link that triggers the crafted POST request. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches have been linked, suggesting that mitigation may rely on configuration changes or vendor updates when available. The vulnerability falls under CWE-79, a common web application security weakness related to improper neutralization of input leading to XSS attacks.
Potential Impact
For European organizations, the exploitation of this XSS vulnerability on Arris NVG443B routers could lead to unauthorized access to router management interfaces, potentially allowing attackers to alter network configurations, redirect traffic, or intercept sensitive data. While the direct impact on availability is negligible, the compromise of router integrity and confidentiality can facilitate further attacks within the network, such as man-in-the-middle attacks or lateral movement. Organizations relying on these routers for critical network infrastructure, especially in small to medium enterprises or home office environments, may face increased risk of data leakage or network manipulation. The requirement for user interaction limits large-scale automated exploitation but does not eliminate targeted attacks, particularly spear-phishing or social engineering campaigns aimed at network administrators or users with access to the router interface. Given the router's role as a gateway device, successful exploitation could undermine perimeter security, affecting the confidentiality and integrity of internal communications and data.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's web management interface to trusted networks only, ideally via VPN or secure management VLANs, to prevent exposure to untrusted users. 2. Disable remote management features if not strictly necessary, reducing the attack surface. 3. Implement strict input validation and sanitization on the router's web interface if vendor updates or patches become available; monitor vendor advisories for firmware updates addressing this vulnerability. 4. Employ network-level protections such as web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious POST requests targeting /cgi-bin/logs.ha. 5. Educate users and administrators about the risks of interacting with unsolicited links or web content that could trigger malicious POST requests, emphasizing cautious behavior to mitigate user interaction requirements. 6. Regularly audit router configurations and logs for signs of unauthorized access or anomalous POST requests. 7. Consider replacing or upgrading affected hardware if vendor support is discontinued or patches are unavailable, to ensure long-term security.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-11-07T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf77a2
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 4:36:29 PM
Last updated: 2/7/2026, 12:42:44 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.