CVE-2023-51739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hathway Skyworth Router CM5100
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Device Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
AI Analysis
Technical Summary
CVE-2023-51739 is a medium-severity vulnerability identified in the Hathway Skyworth Router CM5100, specifically version 4.1.1.24. The root cause is an improper neutralization of input during web page generation, classified under CWE-79 (Cross-site Scripting, XSS). The vulnerability arises from insufficient validation of user-supplied input in the Device Name parameter of the router's web interface. An attacker with remote access to the router's web interface can supply specially crafted input to this parameter, which is then stored and later rendered without proper sanitization. This leads to a stored XSS condition, allowing the attacker to execute arbitrary scripts in the context of the victim's browser when they access the affected interface. The CVSS v3.1 score is 6.9, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction (UI:R), scope changed (S:C), low confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). Notably, exploitation requires authentication and user interaction, limiting the attack surface somewhat. There are no known exploits in the wild as of the publication date (January 17, 2024), and no patches have been linked yet. The vulnerability could allow attackers to manipulate the router's web interface, potentially leading to session hijacking, credential theft, or further compromise of the network environment through malicious script execution.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network security and integrity. Routers like the Skyworth CM5100 are often deployed in small to medium enterprises or residential environments, including home offices, which have become increasingly critical due to remote work trends. Successful exploitation could allow attackers to execute malicious scripts within the administrative interface, potentially leading to unauthorized changes in router configuration, interception of sensitive data, or pivoting to internal networks. This could disrupt business operations, compromise confidential information, and degrade trust in network infrastructure. Given the requirement for authentication and user interaction, the risk is somewhat mitigated but remains significant in environments where credentials are weak or reused, or where phishing/social engineering can be employed. The integrity impact is high, as attackers could alter router settings, possibly enabling persistent backdoors or traffic interception. Confidentiality impact is low to medium, depending on the data accessible via the router interface. Availability is not affected directly. The vulnerability's exploitation could also serve as a foothold for more advanced attacks targeting European organizations' internal networks.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit and restrict access to the router's web interface, ensuring it is not exposed to untrusted networks or the internet. 2) Enforce strong, unique administrative credentials and consider multi-factor authentication if supported. 3) Monitor for unusual activity or unauthorized changes in router configurations. 4) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 5) Regularly update router firmware and monitor vendor communications for patches addressing this vulnerability. 6) Educate users and administrators about phishing and social engineering risks to reduce the chance of credential compromise. 7) Where possible, replace or upgrade vulnerable devices to models with better security postures. 8) Employ web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal management interfaces. These steps go beyond generic advice by focusing on access control, credential hygiene, network architecture, and proactive monitoring tailored to this specific router vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2023-51739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Hathway Skyworth Router CM5100
Description
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Device Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
AI-Powered Analysis
Technical Analysis
CVE-2023-51739 is a medium-severity vulnerability identified in the Hathway Skyworth Router CM5100, specifically version 4.1.1.24. The root cause is an improper neutralization of input during web page generation, classified under CWE-79 (Cross-site Scripting, XSS). The vulnerability arises from insufficient validation of user-supplied input in the Device Name parameter of the router's web interface. An attacker with remote access to the router's web interface can supply specially crafted input to this parameter, which is then stored and later rendered without proper sanitization. This leads to a stored XSS condition, allowing the attacker to execute arbitrary scripts in the context of the victim's browser when they access the affected interface. The CVSS v3.1 score is 6.9, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), user interaction (UI:R), scope changed (S:C), low confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). Notably, exploitation requires authentication and user interaction, limiting the attack surface somewhat. There are no known exploits in the wild as of the publication date (January 17, 2024), and no patches have been linked yet. The vulnerability could allow attackers to manipulate the router's web interface, potentially leading to session hijacking, credential theft, or further compromise of the network environment through malicious script execution.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network security and integrity. Routers like the Skyworth CM5100 are often deployed in small to medium enterprises or residential environments, including home offices, which have become increasingly critical due to remote work trends. Successful exploitation could allow attackers to execute malicious scripts within the administrative interface, potentially leading to unauthorized changes in router configuration, interception of sensitive data, or pivoting to internal networks. This could disrupt business operations, compromise confidential information, and degrade trust in network infrastructure. Given the requirement for authentication and user interaction, the risk is somewhat mitigated but remains significant in environments where credentials are weak or reused, or where phishing/social engineering can be employed. The integrity impact is high, as attackers could alter router settings, possibly enabling persistent backdoors or traffic interception. Confidentiality impact is low to medium, depending on the data accessible via the router interface. Availability is not affected directly. The vulnerability's exploitation could also serve as a foothold for more advanced attacks targeting European organizations' internal networks.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit and restrict access to the router's web interface, ensuring it is not exposed to untrusted networks or the internet. 2) Enforce strong, unique administrative credentials and consider multi-factor authentication if supported. 3) Monitor for unusual activity or unauthorized changes in router configurations. 4) Implement network segmentation to limit the impact of a compromised router on critical internal systems. 5) Regularly update router firmware and monitor vendor communications for patches addressing this vulnerability. 6) Educate users and administrators about phishing and social engineering risks to reduce the chance of credential compromise. 7) Where possible, replace or upgrade vulnerable devices to models with better security postures. 8) Employ web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting internal management interfaces. These steps go beyond generic advice by focusing on access control, credential hygiene, network architecture, and proactive monitoring tailored to this specific router vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-In
- Date Reserved
- 2023-12-22T09:53:53.227Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dbfa6182aa0cae24982cc
Added to database: 6/2/2025, 3:13:42 PM
Last enriched: 7/3/2025, 5:25:02 PM
Last updated: 7/29/2025, 4:52:57 AM
Views: 12
Related Threats
CVE-2025-8966: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8965: Unrestricted Upload in linlinjava litemall
MediumCVE-2025-36047: CWE-770 Allocation of Resources Without Limits or Throttling in IBM WebSphere Application Server Liberty
MediumCVE-2025-33142: CWE-295 Improper Certificate Validation in IBM WebSphere Application Server
MediumCVE-2025-53631: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in DogukanUrker flaskBlog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.