Skip to main content

CVE-2023-49258: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hongdian H8951-4G-ESP

Medium
VulnerabilityCVE-2023-49258cvecve-2023-49258cwe-79
Published: Fri Jan 12 2024 (01/12/2024, 14:24:57 UTC)
Source: CVE Database V5
Vendor/Project: Hongdian
Product: H8951-4G-ESP

Description

User browser may be forced to execute JavaScript and pass the authentication cookie to the attacker leveraging the XSS vulnerability located at "/gui/terminal_tool.cgi" in the "data" parameter.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:43:24 UTC

Technical Analysis

CVE-2023-49258 is a cross-site scripting (XSS) vulnerability identified in the Hongdian H8951-4G-ESP device, specifically within the web interface endpoint "/gui/terminal_tool.cgi". The vulnerability arises due to improper neutralization of user-supplied input in the "data" parameter during web page generation, classified under CWE-79. When exploited, an attacker can inject malicious JavaScript code that executes in the context of the victim's browser. This can lead to the theft of authentication cookies, enabling session hijacking or unauthorized access to the device's management interface. The vulnerability requires no prior authentication (PR:N) but does require user interaction (UI:R), such as the victim visiting a crafted URL or clicking a malicious link. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely over the network. The vulnerability impacts confidentiality and integrity by allowing cookie theft and potential unauthorized actions but does not affect availability. The CVSS 3.1 base score is 6.1 (medium severity), reflecting the moderate impact and ease of exploitation. No known public exploits are reported yet, and no patches have been linked, indicating that mitigation may currently rely on workarounds or vendor updates. The Hongdian H8951-4G-ESP is a specialized 4G communication device, likely used in industrial or telecommunication contexts, which may have web management interfaces accessible to administrators or users.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to entities using Hongdian H8951-4G-ESP devices in their network infrastructure, especially in sectors relying on 4G communication devices such as utilities, industrial control systems, or telecommunications providers. Successful exploitation could lead to unauthorized access to device management interfaces, enabling attackers to manipulate device configurations, intercept or redirect communications, or pivot deeper into the network. The theft of authentication cookies compromises session integrity, potentially allowing attackers to bypass authentication controls. This could result in data leakage, disruption of communication services, or unauthorized control over critical infrastructure components. Given the device's role in communication, the impact on confidentiality and integrity could affect operational continuity and data privacy compliance under European regulations such as GDPR. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could be effective. The absence of patches increases exposure risk until vendor remediation is available.

Mitigation Recommendations

1. Restrict access to the device's web management interface to trusted networks only, using network segmentation and firewall rules to limit exposure to the internet or untrusted users. 2. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block malicious payloads targeting the "data" parameter in "/gui/terminal_tool.cgi". 3. Educate users and administrators about phishing risks and the dangers of clicking on untrusted links to reduce the likelihood of user interaction exploitation. 4. Monitor device logs and network traffic for unusual activities indicative of exploitation attempts, such as unexpected requests to the vulnerable endpoint or anomalous session behaviors. 5. Regularly check for vendor updates or patches addressing this vulnerability and apply them promptly once available. 6. If possible, disable or restrict the vulnerable web interface functionality until a patch is released. 7. Implement multi-factor authentication (MFA) for device access to mitigate the impact of stolen session cookies. 8. Conduct periodic security assessments and penetration tests focusing on web interfaces of critical devices to identify similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2023-11-24T11:53:46.294Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034a182aa0cae27e65f8

Added to database: 6/3/2025, 2:14:34 PM

Last enriched: 7/4/2025, 4:43:24 PM

Last updated: 8/10/2025, 11:10:56 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats