Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29520: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Shenzhen Hereta Technology Co., Ltd. Hereta ETH-IMC408M

0
Medium
VulnerabilityCVE-2026-29520cvecve-2026-29520cwe-79
Published: Mon Mar 16 2026 (03/16/2026, 16:55:52 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Hereta Technology Co., Ltd.
Product: Hereta ETH-IMC408M

Description

CVE-2026-29520 is a reflected cross-site scripting (XSS) vulnerability in the Hereta ETH-IMC408M device firmware version 1. 0. 15 and earlier. The flaw exists in the Network Diagnosis ping function, specifically in the ping_ipaddr parameter, which does not properly sanitize user input. Attackers can craft malicious URLs containing JavaScript payloads that execute when an authenticated administrator clicks the link, potentially compromising their session. This vulnerability requires user interaction but no authentication bypass or privileges are needed to trigger the attack. While no known exploits are currently active in the wild, the medium severity CVSS score of 5. 1 reflects the moderate risk posed by this vulnerability. Organizations using this device should prioritize input validation and consider restricting access to the management interface. The vulnerability primarily affects deployments of Shenzhen Hereta Technology Co.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:01:26 UTC

Technical Analysis

The CVE-2026-29520 vulnerability is a reflected cross-site scripting (XSS) issue found in the firmware of the Hereta ETH-IMC408M device, specifically versions 1.0.15 and earlier. The vulnerability arises from improper neutralization of input in the ping_ipaddr parameter of the Network Diagnosis ping function. When an attacker crafts a malicious URL embedding JavaScript code within this parameter, and an authenticated administrator visits the link, the script executes in the context of the administrator's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed with the administrator's privileges. The vulnerability does not require prior authentication to exploit, but the victim must be an authenticated administrator who clicks the malicious link, making social engineering a likely attack vector. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The vulnerability affects the confidentiality and integrity of the administrative session but does not directly impact availability. No patches or official fixes are currently linked, and no exploits have been reported in the wild. The vulnerability is classified under CWE-79, which covers improper input neutralization leading to XSS attacks.

Potential Impact

If exploited, this vulnerability could allow attackers to execute arbitrary JavaScript in the context of an authenticated administrator's session, potentially leading to session hijacking, theft of sensitive credentials, or unauthorized administrative actions on the affected device. This could compromise the security and integrity of the network device, leading to broader network compromise or disruption. Since the device is a network management component, attackers gaining control could manipulate network configurations or intercept network traffic. The requirement for user interaction limits the attack scope, but targeted spear-phishing or social engineering campaigns could be effective. Organizations relying on Hereta ETH-IMC408M devices in critical network infrastructure or enterprise environments face risks of unauthorized access and control, which could cascade into larger security incidents.

Mitigation Recommendations

Organizations should immediately restrict access to the management interface of the Hereta ETH-IMC408M device to trusted networks and users only, ideally through network segmentation and firewall rules. Administrators should be trained to recognize and avoid clicking suspicious links, especially those targeting device management interfaces. Implementing web application firewalls (WAFs) that can detect and block reflected XSS payloads targeting the ping_ipaddr parameter may provide additional protection. Monitoring administrative sessions for unusual activity can help detect exploitation attempts. Vendors and users should prioritize firmware updates once patches become available. In the interim, disabling or limiting the use of the Network Diagnosis ping function may reduce exposure. Employing Content Security Policy (CSP) headers where possible can help mitigate the impact of XSS attacks by restricting script execution contexts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-04T15:39:26.872Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b83bfc9d4df451837721aa

Added to database: 3/16/2026, 5:21:00 PM

Last enriched: 3/24/2026, 1:01:26 AM

Last updated: 4/30/2026, 6:12:36 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses