Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34808: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Endian Endian Firewall

0
Medium
VulnerabilityCVE-2026-34808cvecve-2026-34808cwe-79
Published: Thu Apr 02 2026 (04/02/2026, 14:46:01 UTC)
Source: CVE Database V5
Vendor/Project: Endian
Product: Endian Firewall

Description

Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/outgoingfw.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 15:40:11 UTC

Technical Analysis

CVE-2026-34808 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Endian Firewall version 3.3.25 and prior. The flaw exists due to improper neutralization of input during web page generation, specifically in the 'remark' parameter handled by the /cgi-bin/outgoingfw.cgi CGI script. An attacker with valid authentication credentials can inject arbitrary JavaScript code into this parameter, which is then stored persistently on the firewall device. When other authenticated users view the affected page, the malicious script executes in their browsers within the security context of the firewall's web interface. This can lead to theft of session cookies, unauthorized actions, or further compromise of the firewall management interface. The vulnerability has a CVSS 4.0 score of 5.1, reflecting medium severity, with an attack vector of network (remote), low attack complexity, no privileges beyond authentication required, and user interaction necessary to trigger the exploit. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the nature of stored XSS in security appliances is concerning because it can undermine administrative controls and lead to broader network compromise if leveraged by attackers. Endian Firewall is used primarily in small to medium enterprises and some governmental organizations, making the impact potentially significant in those environments.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality and integrity within the firewall's administrative interface. Successful exploitation allows an authenticated attacker to execute arbitrary JavaScript in the browsers of other users, potentially leading to session hijacking, credential theft, or unauthorized administrative actions. This can result in loss of control over firewall configurations, enabling attackers to alter firewall rules, disable protections, or create backdoors. Although availability impact is limited, the breach of administrative controls can indirectly affect network security posture and availability. Organizations relying on Endian Firewall for perimeter defense or internal segmentation may face increased risk of lateral movement and data exfiltration if this vulnerability is exploited. The requirement for authentication limits exposure to insiders or attackers who have already compromised some credentials, but the low attack complexity and lack of need for additional privileges make it a practical threat. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2026-34808, organizations should upgrade Endian Firewall to a version later than 3.3.25 once a patch is released by the vendor. In the absence of an official patch, administrators should restrict access to the firewall's web interface to trusted networks and users only, employing network segmentation and VPNs to limit exposure. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Regularly audit user accounts and session activity to detect suspicious behavior. Additionally, administrators can monitor and sanitize inputs to the 'remark' parameter if possible through custom rules or web application firewalls (WAFs) to block malicious scripts. Educating users about the risks of interacting with suspicious content in the firewall interface can also reduce the likelihood of successful exploitation. Finally, maintain up-to-date backups of firewall configurations to enable rapid recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-30T20:26:18.725Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ce8671e6bfc5ba1de33777

Added to database: 4/2/2026, 3:08:33 PM

Last enriched: 4/2/2026, 3:40:11 PM

Last updated: 4/3/2026, 5:59:54 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses