Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29513: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M

0
Medium
VulnerabilityCVE-2026-29513cvecve-2026-29513cwe-79
Published: Mon Mar 16 2026 (03/16/2026, 16:56:06 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Hereta Technology Co., Ltd.
Product: Hereta ETH-IMC408M

Description

CVE-2026-29513 is a stored cross-site scripting (XSS) vulnerability affecting Shenzhen Hereta Technology Co. , Ltd. 's Hereta ETH-IMC408M device firmware version 1. 0. 15 and earlier. Authenticated attackers can exploit this flaw by injecting arbitrary JavaScript code via the Device Location field in the System Status interface. The vulnerability arises due to improper input neutralization, allowing malicious scripts to execute in the browsers of users viewing the status page. Exploitation requires authentication and user interaction (viewing the status page). The CVSS 4. 0 base score is 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:00:33 UTC

Technical Analysis

The vulnerability CVE-2026-29513 is a stored cross-site scripting (XSS) flaw classified under CWE-79, found in the firmware of the Hereta ETH-IMC408M device by Shenzhen Hereta Technology Co., Ltd. Firmware versions 1.0.15 and prior are affected. The issue stems from improper neutralization of input during web page generation, specifically in the Device Location field accessible via the System Status interface. Authenticated attackers can inject malicious JavaScript code into this field, which is stored and later rendered without proper sanitization when users access the status page. This allows the execution of arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The attack requires the attacker to have valid credentials (authenticated access) and relies on user interaction to view the compromised status page. The vulnerability has a CVSS 4.0 score of 5.1, reflecting medium severity due to network attack vector, low attack complexity, no privileges required beyond authentication, and user interaction needed. No public exploits or patches are currently available, increasing the urgency for organizations to implement compensating controls. The vulnerability affects the confidentiality and integrity of user sessions and data but does not directly impact availability. The scope is limited to the device's web interface users. Given the device's use in network management or monitoring, exploitation could facilitate further lateral movement or data exfiltration within affected environments.

Potential Impact

The impact of CVE-2026-29513 is primarily on the confidentiality and integrity of user sessions interacting with the Hereta ETH-IMC408M device's web interface. Successful exploitation can lead to execution of arbitrary JavaScript in the context of authenticated users, enabling attackers to steal session tokens, credentials, or perform unauthorized actions on the device or connected systems. This can compromise network management operations, potentially allowing attackers to manipulate device configurations or gather sensitive information. While the vulnerability does not directly affect device availability, the indirect consequences could include disruption of network monitoring or control functions. Organizations relying on these devices for critical infrastructure or network management could face increased risk of targeted attacks, especially if attackers leverage this foothold for broader network compromise. The requirement for authentication limits the attack surface but does not eliminate risk, particularly in environments with weak credential management or insider threats. The absence of patches and known exploits means organizations must proactively mitigate exposure to prevent potential exploitation.

Mitigation Recommendations

To mitigate CVE-2026-29513, organizations should first restrict access to the Hereta ETH-IMC408M device's web interface to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. Enforce strong authentication mechanisms, including complex passwords and, if possible, multi-factor authentication to reduce the risk of unauthorized access. Monitor and audit access logs for suspicious activities indicative of attempted exploitation. Since no official patches are currently available, implement input validation and output encoding on any proxy or gateway devices that can sanitize user inputs or responses to the device's web interface. Educate users with access to the device about the risks of interacting with untrusted inputs and encourage cautious behavior when viewing device status pages. Consider deploying web application firewalls (WAFs) capable of detecting and blocking XSS payloads targeting the device. Maintain close communication with the vendor for updates on patches or firmware upgrades addressing this vulnerability. Finally, plan for incident response procedures in case exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-04T15:39:26.872Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b83bfc9d4df451837721a6

Added to database: 3/16/2026, 5:21:00 PM

Last enriched: 3/24/2026, 1:00:33 AM

Last updated: 4/30/2026, 5:56:09 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses