CVE-2023-51726: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hathway Skyworth Router CM5100
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the SMTP Server Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
AI Analysis
Technical Summary
CVE-2023-51726 is a cross-site scripting (XSS) vulnerability identified in the Hathway Skyworth Router CM5100, specifically in version 4.1.1.24. The root cause of this vulnerability is improper neutralization of user-supplied input during web page generation, classified under CWE-79. The affected parameter is the SMTP Server Name field in the router's web interface. Due to insufficient input validation, an attacker can inject malicious scripts by supplying specially crafted input to this parameter. This vulnerability is of the stored XSS type, meaning the malicious payload can be saved on the device and executed whenever a legitimate user accesses the affected web interface page. The CVSS v3.1 base score is 6.9, indicating a medium severity level. The vector string (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N) shows that the attack can be performed remotely over the network with low attack complexity but requires high privileges and user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is low, but integrity is high, and availability is not affected. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow attackers with administrative access to the router's web interface to inject malicious scripts that execute in the context of the router's management interface, potentially leading to session hijacking, unauthorized actions, or further compromise of the network environment.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network security and device integrity. Since the affected product is a router used for internet connectivity, exploitation could lead to unauthorized control or manipulation of network traffic, potentially enabling attackers to intercept sensitive communications or pivot to other internal systems. The stored XSS could be leveraged to steal administrative credentials or execute malicious commands within the router's management interface. This is particularly concerning for organizations relying on Hathway Skyworth CM5100 routers in their infrastructure, including small to medium enterprises or ISPs using this hardware for customer premises equipment. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or attackers who have already gained some level of access. The impact on confidentiality and integrity could lead to data breaches or network disruptions, affecting business operations and compliance with European data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's web interface to trusted administrators only, ideally through network segmentation and VPN access. 2. Implement strict input validation and sanitization on the SMTP Server Name parameter to neutralize any malicious scripts before they are stored or rendered. 3. Monitor router management interfaces for unusual input patterns or administrative actions that could indicate exploitation attempts. 4. Apply firmware updates or patches from Hathway as soon as they become available; in the absence of official patches, consider temporary replacement or isolation of affected devices. 5. Educate network administrators about the risks of stored XSS and the importance of secure credential management to prevent privilege escalation. 6. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) capable of detecting and blocking XSS payloads targeting router management interfaces. 7. Regularly audit router configurations and logs to detect anomalies that may indicate exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2023-51726: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hathway Skyworth Router CM5100
Description
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the SMTP Server Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
AI-Powered Analysis
Technical Analysis
CVE-2023-51726 is a cross-site scripting (XSS) vulnerability identified in the Hathway Skyworth Router CM5100, specifically in version 4.1.1.24. The root cause of this vulnerability is improper neutralization of user-supplied input during web page generation, classified under CWE-79. The affected parameter is the SMTP Server Name field in the router's web interface. Due to insufficient input validation, an attacker can inject malicious scripts by supplying specially crafted input to this parameter. This vulnerability is of the stored XSS type, meaning the malicious payload can be saved on the device and executed whenever a legitimate user accesses the affected web interface page. The CVSS v3.1 base score is 6.9, indicating a medium severity level. The vector string (AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N) shows that the attack can be performed remotely over the network with low attack complexity but requires high privileges and user interaction. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is low, but integrity is high, and availability is not affected. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability could allow attackers with administrative access to the router's web interface to inject malicious scripts that execute in the context of the router's management interface, potentially leading to session hijacking, unauthorized actions, or further compromise of the network environment.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network security and device integrity. Since the affected product is a router used for internet connectivity, exploitation could lead to unauthorized control or manipulation of network traffic, potentially enabling attackers to intercept sensitive communications or pivot to other internal systems. The stored XSS could be leveraged to steal administrative credentials or execute malicious commands within the router's management interface. This is particularly concerning for organizations relying on Hathway Skyworth CM5100 routers in their infrastructure, including small to medium enterprises or ISPs using this hardware for customer premises equipment. The requirement for high privileges to exploit reduces the risk from external attackers but raises concerns about insider threats or attackers who have already gained some level of access. The impact on confidentiality and integrity could lead to data breaches or network disruptions, affecting business operations and compliance with European data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the router's web interface to trusted administrators only, ideally through network segmentation and VPN access. 2. Implement strict input validation and sanitization on the SMTP Server Name parameter to neutralize any malicious scripts before they are stored or rendered. 3. Monitor router management interfaces for unusual input patterns or administrative actions that could indicate exploitation attempts. 4. Apply firmware updates or patches from Hathway as soon as they become available; in the absence of official patches, consider temporary replacement or isolation of affected devices. 5. Educate network administrators about the risks of stored XSS and the importance of secure credential management to prevent privilege escalation. 6. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) capable of detecting and blocking XSS payloads targeting router management interfaces. 7. Regularly audit router configurations and logs to detect anomalies that may indicate exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-In
- Date Reserved
- 2023-12-22T09:53:53.226Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682df6dbc4522896dcc0b19e
Added to database: 5/21/2025, 3:52:59 PM
Last enriched: 7/7/2025, 2:12:06 PM
Last updated: 8/5/2025, 12:38:06 PM
Views: 15
Related Threats
CVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighCVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.