Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-34354: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Peplink Surf SOHO HW1

0
Low
VulnerabilityCVE-2023-34354cvecve-2023-34354cwe-80
Published: Wed Oct 11 2023 (10/11/2023, 15:16:56 UTC)
Source: CVE Database V5
Vendor/Project: Peplink
Product: Surf SOHO HW1

Description

A stored cross-site scripting (XSS) vulnerability exists in the upload_brand.cgi functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to execution of arbitrary javascript in another user's browser. An attacker can make an authenticated HTTP request to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:33:14 UTC

Technical Analysis

CVE-2023-34354 identifies a stored cross-site scripting (XSS) vulnerability in the Peplink Surf SOHO HW1 router firmware version 6.3.5 operating within QEMU environments. The vulnerability resides in the upload_brand.cgi endpoint, which improperly neutralizes script-related HTML tags, allowing an attacker to inject malicious JavaScript code. This injected script is stored on the device and executed in the context of other authenticated users' browsers when they access affected pages. Exploitation requires the attacker to be authenticated to the device's web interface and to craft a specially designed HTTP request to the vulnerable endpoint. The vulnerability is categorized under CWE-80, indicating improper neutralization of script-related HTML tags, a classic XSS flaw. The CVSS v3.1 base score is 3.4, reflecting low severity due to the requirement for authentication and user interaction, limited impact on confidentiality, and no impact on integrity or availability. No public exploits or active exploitation campaigns have been reported. The vulnerability could allow attackers to steal session cookies, perform actions on behalf of users, or conduct phishing attacks within the local network. The affected product is primarily used for small office/home office (SOHO) networking, often deployed in remote or branch office scenarios. The lack of an official patch at the time of disclosure necessitates interim mitigations to reduce exposure.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality within networks using the affected Peplink Surf SOHO HW1 devices. Attackers with valid credentials could leverage the XSS flaw to hijack sessions or steal sensitive information from authenticated users managing the device. While the impact on integrity and availability is negligible, the ability to execute arbitrary JavaScript could facilitate further attacks such as phishing or lateral movement within the network. Organizations relying on these routers for secure remote connectivity or branch office networking could face targeted attacks, especially if device management interfaces are exposed or credentials are weak. The low CVSS score and lack of known exploits reduce immediate risk, but the vulnerability could be exploited in targeted campaigns against high-value European entities, including government agencies, financial institutions, and critical infrastructure operators that use Peplink devices.

Mitigation Recommendations

1. Restrict access to the Peplink Surf SOHO HW1 management interface by implementing network segmentation and firewall rules to limit access to trusted IP addresses only. 2. Enforce strong authentication mechanisms, including complex passwords and, if supported, multi-factor authentication to reduce the risk of unauthorized access. 3. Monitor device logs and network traffic for unusual or suspicious HTTP requests targeting the upload_brand.cgi endpoint. 4. Educate users with access to the device management interface about the risks of XSS and the importance of not interacting with suspicious links or content. 5. Regularly check for and apply firmware updates or patches from Peplink as soon as they become available to address this and other vulnerabilities. 6. Consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) that can detect and block malicious payloads targeting the device. 7. If possible, disable or restrict the upload_brand.cgi functionality if it is not required for business operations to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-14T20:33:45.712Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53222a90255b94da665a

Added to database: 11/4/2025, 7:25:22 PM

Last enriched: 11/4/2025, 8:33:14 PM

Last updated: 11/6/2025, 10:30:45 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats