CVE-2026-6999
Remote Cross-Site Scripting in BIVOCOM TR321 Wireless Settings
Publication date: 2026-04-25
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bivocom | tr321 | 21.1.1.50 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the BIVOCOM TR321 device, specifically in an unknown functionality related to the Wireless Setting component. It involves manipulation of the Network Name SSID argument, which leads to a cross-site scripting (XSS) vulnerability. This means an attacker can inject malicious scripts remotely by exploiting the way the device handles the SSID input.
How can this vulnerability impact me? :
The vulnerability allows remote attackers to perform cross-site scripting attacks by manipulating the Network Name SSID. This could potentially enable attackers to execute malicious scripts in the context of the affected device's web interface, possibly leading to unauthorized actions or information disclosure. However, the CVSS scores indicate a low severity impact.