CVE-2024-28091: n/a
Technicolor TC8715D TC8715D-01.EF.04.38.00-180405-S-FF9-D RSE-TC8717T devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via User Defined Service in managed_services_add.asp (the victim must click an X for a deletion).
AI Analysis
Technical Summary
CVE-2024-28091 is a stored cross-site scripting (XSS) vulnerability identified in Technicolor TC8715D and TC8717T router devices, specifically within the User Defined Service functionality accessible via the managed_services_add.asp web interface. The vulnerability arises because the application improperly sanitizes user input, allowing an attacker within Wi-Fi proximity to inject malicious JavaScript code that is stored on the device. When a legitimate user accesses the affected page and clicks the 'X' button to delete a service, the stored script executes in their browser context. This stored XSS attack vector can lead to client-side attacks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability does not require any authentication or elevated privileges, but it does require the victim's interaction (clicking the deletion 'X'). The CVSS 3.1 score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the vulnerable device itself. No patches or official mitigations have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security flaw.
Potential Impact
The primary impact of CVE-2024-28091 is on the confidentiality and integrity of users interacting with the affected router's web interface. An attacker within Wi-Fi range can inject malicious scripts that execute in the context of the victim's browser, potentially stealing session cookies, capturing credentials, or performing unauthorized actions on the router's management interface. This can lead to further compromise of the device or network if attackers leverage stolen credentials or session tokens. The requirement for user interaction (clicking the deletion 'X') limits the ease of exploitation but does not eliminate risk, especially in environments with untrusted or public Wi-Fi access. The vulnerability does not directly affect availability but could be a stepping stone for more severe attacks. Organizations relying on these Technicolor devices, particularly in residential, small office, or ISP-provided environments, may face increased risk of targeted attacks or lateral movement within local networks. The lack of patches increases exposure duration, and attackers could develop exploits if the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2024-28091, organizations and users should first restrict physical and Wi-Fi access to trusted individuals to reduce the attack surface. Network segmentation and strong Wi-Fi encryption (WPA3 or WPA2 with strong passwords) can limit attacker proximity. Administrators should monitor for firmware updates or security advisories from Technicolor and apply patches promptly once available. In the interim, disabling or restricting access to the User Defined Service feature or the affected managed_services_add.asp page, if possible, can reduce risk. Employing web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block XSS payloads may provide additional protection. Educating users about the risks of clicking unexpected interface elements, especially in shared environments, can help prevent exploitation. Finally, auditing router configurations and logs for suspicious activity can aid in early detection of exploitation attempts.
Affected Countries
United States, France, Germany, United Kingdom, Italy, Spain, Brazil, India, Australia, Canada
CVE-2024-28091: n/a
Description
Technicolor TC8715D TC8715D-01.EF.04.38.00-180405-S-FF9-D RSE-TC8717T devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via User Defined Service in managed_services_add.asp (the victim must click an X for a deletion).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-28091 is a stored cross-site scripting (XSS) vulnerability identified in Technicolor TC8715D and TC8717T router devices, specifically within the User Defined Service functionality accessible via the managed_services_add.asp web interface. The vulnerability arises because the application improperly sanitizes user input, allowing an attacker within Wi-Fi proximity to inject malicious JavaScript code that is stored on the device. When a legitimate user accesses the affected page and clicks the 'X' button to delete a service, the stored script executes in their browser context. This stored XSS attack vector can lead to client-side attacks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability does not require any authentication or elevated privileges, but it does require the victim's interaction (clicking the deletion 'X'). The CVSS 3.1 score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the vulnerable device itself. No patches or official mitigations have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application security flaw.
Potential Impact
The primary impact of CVE-2024-28091 is on the confidentiality and integrity of users interacting with the affected router's web interface. An attacker within Wi-Fi range can inject malicious scripts that execute in the context of the victim's browser, potentially stealing session cookies, capturing credentials, or performing unauthorized actions on the router's management interface. This can lead to further compromise of the device or network if attackers leverage stolen credentials or session tokens. The requirement for user interaction (clicking the deletion 'X') limits the ease of exploitation but does not eliminate risk, especially in environments with untrusted or public Wi-Fi access. The vulnerability does not directly affect availability but could be a stepping stone for more severe attacks. Organizations relying on these Technicolor devices, particularly in residential, small office, or ISP-provided environments, may face increased risk of targeted attacks or lateral movement within local networks. The lack of patches increases exposure duration, and attackers could develop exploits if the vulnerability becomes widely known.
Mitigation Recommendations
To mitigate CVE-2024-28091, organizations and users should first restrict physical and Wi-Fi access to trusted individuals to reduce the attack surface. Network segmentation and strong Wi-Fi encryption (WPA3 or WPA2 with strong passwords) can limit attacker proximity. Administrators should monitor for firmware updates or security advisories from Technicolor and apply patches promptly once available. In the interim, disabling or restricting access to the User Defined Service feature or the affected managed_services_add.asp page, if possible, can reduce risk. Employing web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block XSS payloads may provide additional protection. Educating users about the risks of clicking unexpected interface elements, especially in shared environments, can help prevent exploitation. Finally, auditing router configurations and logs for suspicious activity can aid in early detection of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d89b7ef31ef0b587fb1
Added to database: 2/25/2026, 9:45:45 PM
Last enriched: 2/28/2026, 10:17:42 AM
Last updated: 4/12/2026, 7:53:00 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.