CVE-2023-51735: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hathway Skyworth Router CM5100
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
AI Analysis
Technical Summary
CVE-2023-51735 is a medium-severity vulnerability affecting the Hathway Skyworth Router CM5100, specifically version 4.1.1.24. The root cause is improper neutralization of user-supplied input during web page generation, classified under CWE-79 (Cross-site Scripting - XSS). The vulnerability arises from insufficient validation of the 'Pre-shared key' parameter in the router's web interface. An attacker with remote access to the router's web interface can supply specially crafted input to this parameter, which is then stored and later rendered without proper sanitization. This enables a stored XSS attack, where malicious scripts can execute in the context of the victim's browser when they access the affected interface. The CVSS 3.1 score is 6.9, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction required (UI:R), scope changed (S:C), with low confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). The vulnerability does not currently have known exploits in the wild, but its presence in a network device like a router makes it a significant concern due to the potential for persistent compromise and lateral movement within networks. The vulnerability's exploitation requires authentication and user interaction, which somewhat limits its ease of exploitation but does not eliminate risk, especially in environments where multiple users have access to the router's management interface. The stored XSS can be leveraged to hijack sessions, steal credentials, or perform unauthorized actions within the router's management console, potentially leading to broader network compromise.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure security and operational integrity. Routers like the Skyworth CM5100 are often deployed in small to medium enterprises or residential environments, including home offices, which have become increasingly relevant due to remote work trends. Exploitation could allow attackers to execute malicious scripts that compromise router management sessions, potentially leading to unauthorized configuration changes, interception of network traffic, or pivoting attacks into internal networks. This could result in data breaches, disruption of network services, or further malware deployment. Given the medium severity and requirement for authentication, the threat is more pronounced in environments where router credentials are weak, shared, or where multiple users have access to the router interface. The impact on confidentiality is limited but non-negligible, while the integrity impact is high, as attackers can alter router settings. Availability is not directly affected. The vulnerability could also undermine trust in network security, especially in sectors handling sensitive data such as finance, healthcare, and government services within Europe.
Mitigation Recommendations
1. Immediate mitigation involves restricting access to the router's web management interface to trusted networks and users only, ideally via VPN or secure management VLANs. 2. Enforce strong, unique passwords for router administration accounts to reduce the risk of unauthorized authentication. 3. Disable remote management features if not required, or restrict them to specific IP addresses. 4. Monitor router logs for unusual access patterns or repeated failed login attempts. 5. Implement Content Security Policy (CSP) headers if the router firmware supports it to mitigate the impact of XSS. 6. Regularly audit and sanitize all user inputs in the router's web interface, and apply patches or firmware updates from the vendor once available. 7. Educate users with access to the router interface about the risks of clicking on suspicious links or executing unknown scripts. 8. Network segmentation can limit the impact of a compromised router by isolating critical systems from less secure network segments. Since no patch is currently available, these steps are critical to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2023-51735: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hathway Skyworth Router CM5100
Description
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
AI-Powered Analysis
Technical Analysis
CVE-2023-51735 is a medium-severity vulnerability affecting the Hathway Skyworth Router CM5100, specifically version 4.1.1.24. The root cause is improper neutralization of user-supplied input during web page generation, classified under CWE-79 (Cross-site Scripting - XSS). The vulnerability arises from insufficient validation of the 'Pre-shared key' parameter in the router's web interface. An attacker with remote access to the router's web interface can supply specially crafted input to this parameter, which is then stored and later rendered without proper sanitization. This enables a stored XSS attack, where malicious scripts can execute in the context of the victim's browser when they access the affected interface. The CVSS 3.1 score is 6.9, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction required (UI:R), scope changed (S:C), with low confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). The vulnerability does not currently have known exploits in the wild, but its presence in a network device like a router makes it a significant concern due to the potential for persistent compromise and lateral movement within networks. The vulnerability's exploitation requires authentication and user interaction, which somewhat limits its ease of exploitation but does not eliminate risk, especially in environments where multiple users have access to the router's management interface. The stored XSS can be leveraged to hijack sessions, steal credentials, or perform unauthorized actions within the router's management console, potentially leading to broader network compromise.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network infrastructure security and operational integrity. Routers like the Skyworth CM5100 are often deployed in small to medium enterprises or residential environments, including home offices, which have become increasingly relevant due to remote work trends. Exploitation could allow attackers to execute malicious scripts that compromise router management sessions, potentially leading to unauthorized configuration changes, interception of network traffic, or pivoting attacks into internal networks. This could result in data breaches, disruption of network services, or further malware deployment. Given the medium severity and requirement for authentication, the threat is more pronounced in environments where router credentials are weak, shared, or where multiple users have access to the router interface. The impact on confidentiality is limited but non-negligible, while the integrity impact is high, as attackers can alter router settings. Availability is not directly affected. The vulnerability could also undermine trust in network security, especially in sectors handling sensitive data such as finance, healthcare, and government services within Europe.
Mitigation Recommendations
1. Immediate mitigation involves restricting access to the router's web management interface to trusted networks and users only, ideally via VPN or secure management VLANs. 2. Enforce strong, unique passwords for router administration accounts to reduce the risk of unauthorized authentication. 3. Disable remote management features if not required, or restrict them to specific IP addresses. 4. Monitor router logs for unusual access patterns or repeated failed login attempts. 5. Implement Content Security Policy (CSP) headers if the router firmware supports it to mitigate the impact of XSS. 6. Regularly audit and sanitize all user inputs in the router's web interface, and apply patches or firmware updates from the vendor once available. 7. Educate users with access to the router interface about the risks of clicking on suspicious links or executing unknown scripts. 8. Network segmentation can limit the impact of a compromised router by isolating critical systems from less secure network segments. Since no patch is currently available, these steps are critical to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-In
- Date Reserved
- 2023-12-22T09:53:53.227Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5b1b0bd07c3938c890
Added to database: 6/10/2025, 6:54:19 PM
Last enriched: 7/10/2025, 10:18:31 PM
Last updated: 8/12/2025, 8:57:25 PM
Views: 11
Related Threats
CVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighCVE-2025-8978: Insufficient Verification of Data Authenticity in D-Link DIR-619L
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.