CVE-2021-47858
Stored XSS in Genexis Platinum-4410 Security Management Interface
Publication date: 2026-01-21
Last updated on: 2026-01-21
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| genexis | platinum-4410 | p4410-v2-1.31a |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue in the Genexis Platinum-4410 device's Security Management interface, specifically in the 'start_addr' parameter. An attacker can inject malicious JavaScript code into this parameter, which is then stored persistently. When privileged users access the security management page, the malicious script executes, potentially compromising their sessions and security. [1]
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to execute malicious scripts in the context of the security management interface when accessed by privileged users. This can lead to compromised user sessions, unauthorized actions, or theft of sensitive information from the device management interface, thereby undermining the security of the device and network. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect this vulnerability, you can attempt to inject a test script payload into the 'start_addr' parameter of the Security Management interface on the Genexis Platinum-4410 device. Steps include logging into the device firmware, navigating to 'Manage' -> 'Security Management', entering a test payload such as <script>alert(1)</script> in the 'Start Source Address' field, and submitting it. Then, log out and log back in to see if the script executes, indicating the presence of the stored XSS vulnerability. Capturing and modifying the HTTP request with tools like Burp Suite can assist in testing the parameter. There are no specific command-line commands provided, but using HTTP request interception and modification tools is recommended. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of the vulnerable 'start_addr' parameter in the Security Management interface until a patch or update is available. Restrict access to the management interface to trusted users only, preferably via network segmentation or firewall rules. Monitor and audit the device for any suspicious scripts or entries in the 'start_addr' field. If possible, update the device firmware to a version that addresses this vulnerability once released by the vendor. [1]