Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0788: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ALGO 8180 IP Audio Alerter

0
Medium
VulnerabilityCVE-2026-0788cvecve-2026-0788cwe-79
Published: Fri Jan 23 2026 (01/23/2026, 03:01:12 UTC)
Source: CVE Database V5
Vendor/Project: ALGO
Product: 8180 IP Audio Alerter

Description

CVE-2026-0788 is a persistent cross-site scripting (XSS) vulnerability in the ALGO 8180 IP Audio Alerter's web interface, specifically in the syslog viewing functionality. This flaw allows unauthenticated remote attackers to inject arbitrary scripts, which execute with the privileges of the targeted user. Exploitation does not require authentication or user interaction, increasing its risk. The vulnerability stems from improper input validation, enabling attackers to manipulate the web UI and potentially perform unauthorized actions. Although the CVSS score is medium (5. 3), the lack of authentication requirement raises concerns about ease of exploitation. No known exploits are currently reported in the wild. European organizations using ALGO 8180 devices should prioritize patching or mitigating this issue to prevent potential compromise of administrative sessions or further attacks leveraging the injected scripts.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:06:55 UTC

Technical Analysis

CVE-2026-0788 is a persistent cross-site scripting vulnerability identified in the ALGO 8180 IP Audio Alerter, a device used for IP-based audio alerting. The vulnerability resides in the web user interface's syslog viewing functionality, where user-supplied data is not properly sanitized or validated before being rendered. This improper neutralization of input (CWE-79) allows an attacker to inject malicious JavaScript code that persists within the application context. Because the vulnerability can be exploited without authentication or user interaction, an attacker can remotely send crafted requests to the device, causing the malicious script to execute in the context of any user accessing the syslog page. This can lead to unauthorized actions such as session hijacking, unauthorized commands, or manipulation of the device's web interface. The CVSS 3.0 base score is 5.3, indicating a medium severity primarily due to the lack of confidentiality impact but with integrity implications. The vulnerability was reported by the Zero Day Initiative (ZDI) under identifier ZDI-CAN-28298 and affects version 5.5 of the product. No patches or exploit code are currently publicly available, but the risk remains significant given the device's role in critical alerting infrastructure.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized control or manipulation of ALGO 8180 IP Audio Alerter devices, which are often deployed in security-sensitive environments such as public safety, transportation hubs, and corporate facilities. Attackers could leverage the XSS flaw to hijack administrative sessions, inject malicious commands, or pivot to other network segments. This could disrupt alerting systems, degrade operational security, or facilitate further attacks such as phishing or malware deployment. Given that the vulnerability requires no authentication, attackers can target exposed devices directly over the network, increasing the attack surface. The integrity of alerting messages and system logs could be compromised, potentially leading to delayed or missed alerts. Although availability impact is not indicated, the indirect effects on operational security and trustworthiness of alerting systems could be substantial. Organizations relying on these devices for critical communications should consider this vulnerability a significant risk to their security posture.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the ALGO 8180 web interface using firewalls or VPNs to limit exposure to trusted administrators only. Employ web application firewalls (WAFs) capable of detecting and blocking XSS payloads targeting the syslog functionality. Regularly monitor device logs and network traffic for unusual activity indicative of exploitation attempts. Disable or restrict access to the syslog viewing feature if feasible until a patch is released. Educate administrators on the risks of XSS and encourage the use of strong, unique credentials for device management interfaces. Once a vendor patch is released, prioritize prompt deployment. Additionally, consider network segmentation to isolate these devices from critical infrastructure to limit potential lateral movement. Conduct periodic security assessments of the devices and their configurations to ensure no additional vulnerabilities are present.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-01-08T22:55:33.353Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972e91a4623b1157cde2eb3

Added to database: 1/23/2026, 3:20:58 AM

Last enriched: 1/30/2026, 10:06:55 AM

Last updated: 2/6/2026, 9:49:02 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats