CVE-2021-47858
Unknown Unknown - Not Provided
Stored XSS in Genexis Platinum-4410 Security Management Interface

Publication date: 2026-01-21

Last updated on: 2026-01-21

Assigner: VulnCheck

Description
Genexis Platinum-4410 P4410-V2-1.31A contains a stored cross-site scripting vulnerability in the 'start_addr' parameter of the Security Management interface. Attackers can inject malicious scripts through the start source address field that will persist and trigger for privileged users when they access the security management page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-21
Last Modified
2026-01-21
Generated
2026-05-07
AI Q&A
2026-01-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
genexis platinum-4410 p4410-v2-1.31a
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue in the Genexis Platinum-4410 device's Security Management interface, specifically in the 'start_addr' parameter. An attacker can inject malicious JavaScript code into this parameter, which is then stored persistently. When privileged users access the security management page, the malicious script executes, potentially compromising their sessions and security. [1]


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to execute malicious scripts in the context of the security management interface when accessed by privileged users. This can lead to compromised user sessions, unauthorized actions, or theft of sensitive information from the device management interface, thereby undermining the security of the device and network. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, you can attempt to inject a test script payload into the 'start_addr' parameter of the Security Management interface on the Genexis Platinum-4410 device. Steps include logging into the device firmware, navigating to 'Manage' -> 'Security Management', entering a test payload such as <script>alert(1)</script> in the 'Start Source Address' field, and submitting it. Then, log out and log back in to see if the script executes, indicating the presence of the stored XSS vulnerability. Capturing and modifying the HTTP request with tools like Burp Suite can assist in testing the parameter. There are no specific command-line commands provided, but using HTTP request interception and modification tools is recommended. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of the vulnerable 'start_addr' parameter in the Security Management interface until a patch or update is available. Restrict access to the management interface to trusted users only, preferably via network segmentation or firewall rules. Monitor and audit the device for any suspicious scripts or entries in the 'start_addr' field. If possible, update the device firmware to a version that addresses this vulnerability once released by the vendor. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart