{"vuid":"VU#917700","idnumber":"917700","name":"Huawei Echo Life HG8247 optical router XSS vulnerability","keywords":["Huawei","Echo Life","HG8247","HG8240","HG8245","xss"],"overview":"Huawei Echo Life HG8247 optical router contains a stored cross-site scripting (XSS) vulnerability","clean_desc":"It has been reported that Huawei Echo Life HG8247 optical routers running software version V1R006C00S120 or earlier contain a stored cross-site scripting (XSS) vulnerability. An unauthenticated attacker can perform a stored cross-site scripting (XSS) attack against an authenticated user through the web interface by creating a malicious entry in the \"failed log-in attempts over telnet\" log view. When logging on to the device using telnet, an attacker can inject arbitrary HTML/Javascript code as a username. It also has been reported that Huawei Echo Life HG8240 and Huawei Echo Life HG8245 routers could also be affected as they share the same service manual.","impact":"An unauthenticated attacker can perform a stored cross-site scripting (XSS) attack against an authenticated user through the web interface by creating a malicious entry in the failed log-in attempts over telnet log view allowing them to run scripts with the permission of the authenticated user.","resolution":"Update Huawei has stated they have addressed this vulnerability and released patch HG8247 V100R006C00SPC127 to affected users. Users who have not received the update can download the fix on Huawei's support site (account is required) or contact Huawei directly.","workarounds":"","sysaffected":"","thanks":"Thanks to Rijnard van Tonder for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://www.huawei.com/en/products/fixed-access/fttx/ont/hg8247/index.htm","http://support.huawei.com/support/pages/editionctrl/catalog/ShowVersionDetail.do?actionFlag=getSoftwareDetail&node_id=000001619370&doc_type=VER_SOFT&doc_type=VER_SOFT"],"cveids":["CVE-2014-0337"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-01-20T17:53:36Z","publicdate":"2014-03-02T00:00:00Z","datefirstpublished":"2014-04-02T12:01:37Z","dateupdated":"2014-04-02T12:01:37Z","revision":10,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:N/A:N","cvss_temporalscore":"3.6","cvss_environmentalscore":"1.048918688323","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}