CVE-2026-29510: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M
CVE-2026-29510 is a stored cross-site scripting (XSS) vulnerability affecting Shenzhen Hereta Technology Co. , Ltd. 's Hereta ETH-IMC408M device firmware version 1. 0. 15 and earlier. Authenticated attackers can exploit this flaw by injecting arbitrary JavaScript code through the Device Name field, which is then rendered unsanitized on the System Status web interface. This vulnerability allows malicious scripts to execute in the browsers of users viewing the status page, potentially leading to session hijacking, credential theft, or unauthorized actions. The vulnerability requires authentication but no user interaction beyond viewing the compromised page. It has a CVSS 4. 0 base score of 5.
AI Analysis
Technical Summary
CVE-2026-29510 is a stored cross-site scripting (XSS) vulnerability identified in the firmware of the Hereta ETH-IMC408M device, specifically versions 1.0.15 and earlier. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Authenticated attackers can manipulate the Device Name field, injecting arbitrary JavaScript code that is stored and subsequently rendered without proper sanitization on the System Status interface. When legitimate users access this interface, the malicious script executes in their browsers, potentially compromising session tokens, redirecting users to malicious sites, or performing unauthorized actions within the context of the user’s session. The attack vector requires the attacker to have authenticated access to the device’s management interface but does not require further user interaction beyond viewing the affected page. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting medium severity due to its network attack vector, low attack complexity, no privileges required beyond authentication, and no user interaction needed for exploitation beyond page viewing. No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability highlights a common security oversight in embedded device web interfaces, where input fields are not properly sanitized before rendering, exposing users to client-side attacks.
Potential Impact
The primary impact of CVE-2026-29510 is the compromise of confidentiality and integrity for users accessing the affected device’s web interface. Successful exploitation can lead to session hijacking, theft of authentication credentials, unauthorized command execution within the user’s browser context, and potential lateral movement within the network if attackers leverage stolen credentials. Since the vulnerability is stored XSS, the malicious payload persists and affects all users who view the System Status page, increasing the attack surface. For organizations, this can result in unauthorized access to device management, disruption of network monitoring, and potential compromise of connected infrastructure. The requirement for attacker authentication limits the risk to environments where attackers can gain initial access, but insider threats or compromised credentials increase the likelihood of exploitation. The lack of patches means the vulnerability remains exploitable, posing ongoing risk. Although no exploits are currently known in the wild, the medium severity score and ease of exploitation suggest that attackers could develop exploits, especially in targeted attacks against organizations relying on these devices for critical network functions.
Mitigation Recommendations
To mitigate CVE-2026-29510, organizations should first restrict access to the Hereta ETH-IMC408M management interface using network segmentation, VPNs, or firewall rules to limit exposure to trusted administrators only. Implement strong authentication mechanisms and monitor for unusual login activity to detect potential insider threats or compromised credentials. Since no official patches are available, administrators should avoid entering untrusted input into the Device Name field and regularly audit device configurations for suspicious entries. Employ web application firewalls (WAFs) capable of detecting and blocking XSS payloads targeting the device’s web interface. Additionally, organizations should consider deploying browser security features such as Content Security Policy (CSP) to reduce the impact of injected scripts. Monitoring network traffic for anomalous behavior related to the device’s web interface can also help detect exploitation attempts. Finally, maintain communication with the vendor for firmware updates and apply patches promptly once available.
Affected Countries
China, India, Vietnam, Thailand, Malaysia, Indonesia, Singapore, United States, Germany, United Kingdom
CVE-2026-29510: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M
Description
CVE-2026-29510 is a stored cross-site scripting (XSS) vulnerability affecting Shenzhen Hereta Technology Co. , Ltd. 's Hereta ETH-IMC408M device firmware version 1. 0. 15 and earlier. Authenticated attackers can exploit this flaw by injecting arbitrary JavaScript code through the Device Name field, which is then rendered unsanitized on the System Status web interface. This vulnerability allows malicious scripts to execute in the browsers of users viewing the status page, potentially leading to session hijacking, credential theft, or unauthorized actions. The vulnerability requires authentication but no user interaction beyond viewing the compromised page. It has a CVSS 4. 0 base score of 5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-29510 is a stored cross-site scripting (XSS) vulnerability identified in the firmware of the Hereta ETH-IMC408M device, specifically versions 1.0.15 and earlier. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Authenticated attackers can manipulate the Device Name field, injecting arbitrary JavaScript code that is stored and subsequently rendered without proper sanitization on the System Status interface. When legitimate users access this interface, the malicious script executes in their browsers, potentially compromising session tokens, redirecting users to malicious sites, or performing unauthorized actions within the context of the user’s session. The attack vector requires the attacker to have authenticated access to the device’s management interface but does not require further user interaction beyond viewing the affected page. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting medium severity due to its network attack vector, low attack complexity, no privileges required beyond authentication, and no user interaction needed for exploitation beyond page viewing. No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability highlights a common security oversight in embedded device web interfaces, where input fields are not properly sanitized before rendering, exposing users to client-side attacks.
Potential Impact
The primary impact of CVE-2026-29510 is the compromise of confidentiality and integrity for users accessing the affected device’s web interface. Successful exploitation can lead to session hijacking, theft of authentication credentials, unauthorized command execution within the user’s browser context, and potential lateral movement within the network if attackers leverage stolen credentials. Since the vulnerability is stored XSS, the malicious payload persists and affects all users who view the System Status page, increasing the attack surface. For organizations, this can result in unauthorized access to device management, disruption of network monitoring, and potential compromise of connected infrastructure. The requirement for attacker authentication limits the risk to environments where attackers can gain initial access, but insider threats or compromised credentials increase the likelihood of exploitation. The lack of patches means the vulnerability remains exploitable, posing ongoing risk. Although no exploits are currently known in the wild, the medium severity score and ease of exploitation suggest that attackers could develop exploits, especially in targeted attacks against organizations relying on these devices for critical network functions.
Mitigation Recommendations
To mitigate CVE-2026-29510, organizations should first restrict access to the Hereta ETH-IMC408M management interface using network segmentation, VPNs, or firewall rules to limit exposure to trusted administrators only. Implement strong authentication mechanisms and monitor for unusual login activity to detect potential insider threats or compromised credentials. Since no official patches are available, administrators should avoid entering untrusted input into the Device Name field and regularly audit device configurations for suspicious entries. Employ web application firewalls (WAFs) capable of detecting and blocking XSS payloads targeting the device’s web interface. Additionally, organizations should consider deploying browser security features such as Content Security Policy (CSP) to reduce the impact of injected scripts. Monitoring network traffic for anomalous behavior related to the device’s web interface can also help detect exploitation attempts. Finally, maintain communication with the vendor for firmware updates and apply patches promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-04T15:39:26.871Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b83bfc9d4df451837721a2
Added to database: 3/16/2026, 5:21:00 PM
Last enriched: 3/24/2026, 1:00:12 AM
Last updated: 4/30/2026, 9:57:41 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.