Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27517: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Binardat Ltd. 10G08-0800GSM Network Switch

0
Medium
VulnerabilityCVE-2026-27517cvecve-2026-27517cwe-79
Published: Tue Feb 24 2026 (02/24/2026, 15:06:08 UTC)
Source: CVE Database V5
Vendor/Project: Binardat Ltd.
Product: 10G08-0800GSM Network Switch

Description

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior reflect unsanitized user input in the web interface, allowing an attacker to inject and execute arbitrary JavaScript in the context of an authenticated user.

AI-Powered Analysis

AILast updated: 02/24/2026, 20:59:14 UTC

Technical Analysis

CVE-2026-27517 is a vulnerability classified under CWE-79, indicating improper neutralization of input during web page generation, commonly known as cross-site scripting (XSS). It affects the Binardat Ltd. 10G08-0800GSM network switch firmware version V300SP10260209 and earlier. The root cause is that the web interface of the device reflects user-supplied input without proper sanitization or encoding, enabling an attacker to inject malicious JavaScript code. When an authenticated user accesses the affected interface, the injected script executes in their browser context, potentially compromising session tokens, credentials, or enabling unauthorized actions on the device. The CVSS 4.0 base score is 5.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required for initial access but requiring at least limited privileges (PR:L) and user interaction (UI:P). The vulnerability does not affect confidentiality, integrity, or availability directly but poses a risk to user session security and device management integrity. No public exploits or patches are currently available, indicating the need for proactive mitigation. The vulnerability's scope is limited to the management interface, which is typically accessed by network administrators or authorized personnel.

Potential Impact

The primary impact of this vulnerability is the potential compromise of the network switch's management interface through session hijacking or unauthorized command execution via injected scripts. Attackers could leverage this to gain elevated privileges, alter device configurations, or disrupt network operations indirectly. This can lead to unauthorized network access, data interception, or lateral movement within an organization's infrastructure. Since the vulnerability requires authenticated access and user interaction, the risk is somewhat mitigated but remains significant in environments where multiple administrators or users access the device remotely or locally. Organizations relying on Binardat 10G08-0800GSM switches in critical network segments could face operational disruptions, data breaches, or compliance violations if exploited. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop targeted exploits. The vulnerability also undermines trust in device management security, potentially increasing the attack surface for advanced persistent threats (APTs).

Mitigation Recommendations

Organizations should immediately restrict access to the Binardat 10G08-0800GSM network switch management interface to trusted networks and personnel only, using network segmentation and firewall rules. Implement multi-factor authentication (MFA) for device access to reduce the risk of compromised credentials. Monitor administrative access logs for suspicious activity and enforce strong password policies. Until a vendor patch is released, consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) that can detect and block XSS payloads targeting the management interface. Educate administrators about the risks of clicking untrusted links or submitting unverified input on the device interface. Regularly check for firmware updates from Binardat Ltd. and apply patches promptly once available. If feasible, isolate the management interface on a dedicated management VLAN with strict access controls. Conduct periodic security assessments and penetration tests focusing on network device management interfaces to identify similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-19T19:51:07.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3ebe58cf853b290d6b

Added to database: 2/24/2026, 8:51:10 PM

Last enriched: 2/24/2026, 8:59:14 PM

Last updated: 2/24/2026, 10:19:51 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats