{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T20:48:02.447","vulnerabilities":[{"cve":{"id":"CVE-2022-36266","sourceIdentifier":"cve@mitre.org","published":"2022-08-08T15:15:08.990","lastModified":"2024-11-21T07:12:41.350","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a stored XSS vulnerability. As the binary file /home/www/cgi-bin/login.cgi does not check if the user is authenticated, a malicious actor can craft a specific request on the login.cgi endpoint that contains a base32 encoded XSS payload that will be accepted and stored. A successful attack will results in the injection of malicious scripts into the user settings page."},{"lang":"es","value":"En Airspan AirSpot 5410 versiones 0.3.4.1-4 y anteriores, se presenta una vulnerabilidad de tipo XSS almacenado. Como el archivo binario /home/www/cgi-bin/login.cgi no comprueba si el usuario está autenticado, un actor malicioso puede diseñar una petición específica en el endpoint login.cgi que contenga una carga útil de tipo XSS codificada en base32 que será aceptada y almacenada. Un ataque con éxito resultará en una inyección de scripts maliciosos en la página de configuración del usuario"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:airspan:airspot_5410_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"0.3.4.1-4","matchCriteriaId":"59C409B3-0CFA-48A0-BEF1-AB721401E8EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:airspan:airspot_5410:-:*:*:*:*:*:*:*","matchCriteriaId":"3AF8C2B0-0EB8-41B8-B2AB-1EFB0AFE71FB"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://gist.github.com/Nwqda/e82b3155401b094372195fdaa9b54833","source":"cve@mitre.org","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://wdi.rfwel.com/cdn/techdocs/AirSpot5410.pdf","source":"cve@mitre.org","tags":["Product","Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://gist.github.com/Nwqda/e82b3155401b094372195fdaa9b54833","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://wdi.rfwel.com/cdn/techdocs/AirSpot5410.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Third Party Advisory"]}]}}]}