ID

VAR-202108-1782


CVE

CVE-2021-34228


TITLE

TOTOLINK A3002R  Cross-site scripting vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2021-012360

DESCRIPTION

Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field. TOTOLINK A3002R Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. TOTOLINK A3002RU is a wireless router product from Taiwan TOTOLINK Company. There is a cross-site scripting vulnerability in TOTOLINK A3002RU, which is caused by the lack of effective validation of client data in the function of the product to modify the Description and Service Name fields. An attacker could use this vulnerability to execute client-side code

Trust: 2.25

sources: NVD: CVE-2021-34228 // JVNDB: JVNDB-2021-012360 // CNVD: CNVD-2022-06508 // VULMON: CVE-2021-34228

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-06508

AFFECTED PRODUCTS

vendor:totolinkmodel:a3002rscope:eqversion:1.1.1-b20200824

Trust: 1.0

vendor:totolinkmodel:a3002rscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a3002rscope:eqversion:a3002r firmware 1.1.1-b20200824

Trust: 0.8

vendor:totolinkmodel:a3002r 1.1.1-b20200824scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-06508 // JVNDB: JVNDB-2021-012360 // NVD: CVE-2021-34228

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-34228
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-34228
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2022-06508
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202108-1807
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-34228
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-34228
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-06508
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-34228
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: CVE-2021-34228
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-06508 // VULMON: CVE-2021-34228 // JVNDB: JVNDB-2021-012360 // CNNVD: CNNVD-202108-1807 // NVD: CVE-2021-34228

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-012360 // NVD: CVE-2021-34228

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-1807

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202108-1807

PATCH

title:Top Pageurl:https://www.totolink.net/

Trust: 0.8

sources: JVNDB: JVNDB-2021-012360

EXTERNAL IDS

db:NVDid:CVE-2021-34228

Trust: 3.9

db:JVNDBid:JVNDB-2021-012360

Trust: 0.8

db:CNVDid:CNVD-2022-06508

Trust: 0.6

db:CNNVDid:CNNVD-202108-1807

Trust: 0.6

db:VULMONid:CVE-2021-34228

Trust: 0.1

sources: CNVD: CNVD-2022-06508 // VULMON: CVE-2021-34228 // JVNDB: JVNDB-2021-012360 // CNNVD: CNNVD-202108-1807 // NVD: CVE-2021-34228

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-34228

Trust: 2.0

url:https://github.com/pup2y/iotvul/tree/main/totolink/a3002r

Trust: 1.7

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-06508 // VULMON: CVE-2021-34228 // JVNDB: JVNDB-2021-012360 // CNNVD: CNNVD-202108-1807 // NVD: CVE-2021-34228

SOURCES

db:CNVDid:CNVD-2022-06508
db:VULMONid:CVE-2021-34228
db:JVNDBid:JVNDB-2021-012360
db:CNNVDid:CNNVD-202108-1807
db:NVDid:CVE-2021-34228

LAST UPDATE DATE

2024-08-14T15:22:11.061000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-06508date:2022-01-25T00:00:00
db:VULMONid:CVE-2021-34228date:2021-08-26T00:00:00
db:JVNDBid:JVNDB-2021-012360date:2022-08-30T03:26:00
db:CNNVDid:CNNVD-202108-1807date:2022-03-24T00:00:00
db:NVDid:CVE-2021-34228date:2021-08-26T14:27:34.350

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-06508date:2022-01-25T00:00:00
db:VULMONid:CVE-2021-34228date:2021-08-20T00:00:00
db:JVNDBid:JVNDB-2021-012360date:2022-08-30T00:00:00
db:CNNVDid:CNNVD-202108-1807date:2021-08-20T00:00:00
db:NVDid:CVE-2021-34228date:2021-08-20T17:15:07.647