CVE-2013-5223

5.4 MEDIUM CISA KEV - Actively Exploited
Published: November 19, 2013 Modified: October 22, 2025

Description

Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2760U Gateway (Rev. E1) allow remote authenticated users to inject arbitrary web script or HTML via the (1) ntpServer1 parameter to sntpcfg.cgi, username parameter to (2) ddnsmngr.cmd or (3) todmngr.tod, (4) TodUrlAdd parameter to urlfilter.cmd, (5) appName parameter to scprttrg.cmd, (6) fltName in an add action or (7) rmLst parameter in a remove action to scoutflt.cmd, (8) groupName parameter to portmapcfg.cmd, (9) snmpRoCommunity parameter to snmpconfig.cgi, (10) fltName parameter to scinflt.cmd, (11) PolicyName in an add action or (12) rmLst parameter in a remove action to prmngr.cmd, (13) ippName parameter to ippcfg.cmd, (14) smbNetBiosName or (15) smbDirName parameter to samba.cgi, or (16) wlSsid parameter to wlcfg.wl.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/99603
Source: cve@mitre.org
Broken Link
http://osvdb.org/99604
Source: cve@mitre.org
Broken Link
http://osvdb.org/99605
Source: cve@mitre.org
Broken Link
http://osvdb.org/99606
Source: cve@mitre.org
Broken Link
http://osvdb.org/99607
Source: cve@mitre.org
Broken Link
http://osvdb.org/99608
Source: cve@mitre.org
Broken Link
http://osvdb.org/99609
Source: cve@mitre.org
Broken Link
http://osvdb.org/99610
Source: cve@mitre.org
Broken Link
http://osvdb.org/99611
Source: cve@mitre.org
Broken Link
http://osvdb.org/99612
Source: cve@mitre.org
Broken Link
http://osvdb.org/99613
Source: cve@mitre.org
Broken Link
http://osvdb.org/99615
Source: cve@mitre.org
Broken Link
http://osvdb.org/99616
Source: cve@mitre.org
Broken Link
http://packetstormsecurity.com/files/123976
Source: cve@mitre.org
Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2013/Nov/76
Source: cve@mitre.org
Exploit Mailing List Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/88723
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/88724
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://osvdb.org/99603
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99604
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99605
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99606
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99607
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99608
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99609
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99610
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99611
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99612
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99613
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99615
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/99616
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://packetstormsecurity.com/files/123976
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2013/Nov/76
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List Third Party Advisory
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10002
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/88723
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/88724
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

37 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.4 / 10.0
EPSS (Exploit Probability)
35.5%
97th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-04-15

Weaknesses (CWE)

Affected Vendors

dlink