CVE-2026-29510: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M
CVE-2026-29510 is a stored cross-site scripting (XSS) vulnerability affecting Shenzhen Hereta Technology Co. , Ltd. 's ETH-IMC408M device firmware version 1. 0. 15 and earlier. Authenticated attackers can exploit this flaw by injecting arbitrary JavaScript code via the Device Name field, which is not properly sanitized. The malicious script executes in the browsers of users who access the System Status interface, potentially leading to session hijacking, credential theft, or other malicious actions. The vulnerability requires authentication but no user interaction beyond viewing the status page. It has a CVSS 4. 0 base score of 5.
AI Analysis
Technical Summary
CVE-2026-29510 identifies a stored cross-site scripting vulnerability in the firmware of the Hereta ETH-IMC408M device, specifically versions 1.0.15 and earlier. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Authenticated users can manipulate the Device Name field to inject malicious JavaScript code that is stored persistently and later rendered unsanitized on the System Status web interface. When other users access this interface, the injected script executes in their browsers with the same privileges as the legitimate web application, potentially compromising user sessions or enabling further attacks such as phishing or malware delivery. The attack vector requires network access and valid credentials, but no additional user interaction beyond viewing the affected page. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and limited scope and impact confined to integrity and availability with low confidentiality impact. No patches or known exploits are currently available, highlighting the need for proactive mitigation. The vulnerability affects embedded device firmware commonly used in network environments, making it a concern for organizations deploying these devices in critical infrastructure or enterprise settings.
Potential Impact
The primary impact of this vulnerability is the potential compromise of user sessions and the execution of arbitrary scripts within the context of the affected device's web interface. This can lead to unauthorized actions performed on behalf of legitimate users, theft of sensitive information such as authentication tokens or credentials, and possible lateral movement within the network if attackers leverage the device as a foothold. Since the vulnerability requires authentication, the risk is somewhat mitigated by credential controls, but insider threats or compromised accounts could exploit it. The persistent nature of the stored XSS increases the risk as multiple users may be exposed over time. Organizations relying on the Hereta ETH-IMC408M for network management or monitoring may face operational disruptions, data leakage, and reputational damage if exploited. The medium CVSS score reflects moderate risk, but the lack of patches and the device's deployment in network-critical roles elevate the urgency for mitigation.
Mitigation Recommendations
1. Immediately restrict access to the device's web interface to trusted administrators only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication mechanisms and monitor for suspicious login activity to reduce the risk of credential compromise. 3. Implement web application firewalls (WAF) or intrusion detection systems (IDS) capable of detecting and blocking XSS payloads targeting the device's management interface. 4. Regularly audit and sanitize all input fields on the device, particularly the Device Name field, to prevent injection of malicious scripts. 5. Until an official patch is released, consider disabling or limiting access to the System Status interface if feasible. 6. Educate administrators to avoid clicking on suspicious links or inputting untrusted data into device fields. 7. Monitor vendor communications for firmware updates addressing this vulnerability and apply patches promptly once available. 8. Conduct periodic security assessments of network devices to identify similar vulnerabilities proactively.
Affected Countries
China, United States, Germany, Japan, South Korea, India, United Kingdom, France, Australia, Canada
CVE-2026-29510: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M
Description
CVE-2026-29510 is a stored cross-site scripting (XSS) vulnerability affecting Shenzhen Hereta Technology Co. , Ltd. 's ETH-IMC408M device firmware version 1. 0. 15 and earlier. Authenticated attackers can exploit this flaw by injecting arbitrary JavaScript code via the Device Name field, which is not properly sanitized. The malicious script executes in the browsers of users who access the System Status interface, potentially leading to session hijacking, credential theft, or other malicious actions. The vulnerability requires authentication but no user interaction beyond viewing the status page. It has a CVSS 4. 0 base score of 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-29510 identifies a stored cross-site scripting vulnerability in the firmware of the Hereta ETH-IMC408M device, specifically versions 1.0.15 and earlier. The vulnerability arises from improper neutralization of input during web page generation, classified under CWE-79. Authenticated users can manipulate the Device Name field to inject malicious JavaScript code that is stored persistently and later rendered unsanitized on the System Status web interface. When other users access this interface, the injected script executes in their browsers with the same privileges as the legitimate web application, potentially compromising user sessions or enabling further attacks such as phishing or malware delivery. The attack vector requires network access and valid credentials, but no additional user interaction beyond viewing the affected page. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and limited scope and impact confined to integrity and availability with low confidentiality impact. No patches or known exploits are currently available, highlighting the need for proactive mitigation. The vulnerability affects embedded device firmware commonly used in network environments, making it a concern for organizations deploying these devices in critical infrastructure or enterprise settings.
Potential Impact
The primary impact of this vulnerability is the potential compromise of user sessions and the execution of arbitrary scripts within the context of the affected device's web interface. This can lead to unauthorized actions performed on behalf of legitimate users, theft of sensitive information such as authentication tokens or credentials, and possible lateral movement within the network if attackers leverage the device as a foothold. Since the vulnerability requires authentication, the risk is somewhat mitigated by credential controls, but insider threats or compromised accounts could exploit it. The persistent nature of the stored XSS increases the risk as multiple users may be exposed over time. Organizations relying on the Hereta ETH-IMC408M for network management or monitoring may face operational disruptions, data leakage, and reputational damage if exploited. The medium CVSS score reflects moderate risk, but the lack of patches and the device's deployment in network-critical roles elevate the urgency for mitigation.
Mitigation Recommendations
1. Immediately restrict access to the device's web interface to trusted administrators only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication mechanisms and monitor for suspicious login activity to reduce the risk of credential compromise. 3. Implement web application firewalls (WAF) or intrusion detection systems (IDS) capable of detecting and blocking XSS payloads targeting the device's management interface. 4. Regularly audit and sanitize all input fields on the device, particularly the Device Name field, to prevent injection of malicious scripts. 5. Until an official patch is released, consider disabling or limiting access to the System Status interface if feasible. 6. Educate administrators to avoid clicking on suspicious links or inputting untrusted data into device fields. 7. Monitor vendor communications for firmware updates addressing this vulnerability and apply patches promptly once available. 8. Conduct periodic security assessments of network devices to identify similar vulnerabilities proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-03-04T15:39:26.871Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b83bfc9d4df451837721a2
Added to database: 3/16/2026, 5:21:00 PM
Last enriched: 3/16/2026, 5:36:31 PM
Last updated: 3/16/2026, 6:12:40 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.