Huashengdun WebSSH har 1.6.2 Login Page hostname/port Cross Site Scripting

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Huashengdun WebSSH har 1.6.2. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil $software_file, a cikin sashi Login Page. Wuro manipulation of the argument hostname/port ga Cross Site Scripting. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-79. Lalle, rauni an sanar da shi 07/19/2025 da 410. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-7885. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

5 Goyarwa · 101 Datenpunkte

FurɗeSúgá
07/19/2025 10:02
Gargadi 1/4
07/19/2025 12:45
Gargadi 2/4
07/20/2025 14:14
Gargadi 3/4
07/20/2025 14:56
Gargadi 4/4
09/15/2025 22:26
software_vendorHuashengdunHuashengdunHuashengdunHuashengdunHuashengdun
software_nameWebSSHWebSSHWebSSHWebSSHWebSSH
software_version<=1.6.2<=1.6.2<=1.6.2<=1.6.2<=1.6.2
software_componentLogin PageLogin PageLogin PageLogin PageLogin Page
software_argumenthostname/porthostname/porthostname/porthostname/porthostname/port
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcCCCCC
advisory_identifier410410410410410
advisory_urlhttps://github.com/huashengdun/webssh/issues/410https://github.com/huashengdun/webssh/issues/410https://github.com/huashengdun/webssh/issues/410https://github.com/huashengdun/webssh/issues/410https://github.com/huashengdun/webssh/issues/410
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/4m3rr0r/PoCVulDb/blob/main/README2.mdhttps://github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7885.mdhttps://github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7885.mdhttps://github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7885.mdhttps://github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7885.md
source_cveCVE-2025-7885CVE-2025-7885CVE-2025-7885CVE-2025-7885CVE-2025-7885
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiPPPPP
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore5.05.05.05.05.0
cvss2_vuldb_tempscore4.54.54.54.54.5
cvss3_vuldb_basescore4.34.34.34.34.3
cvss3_vuldb_tempscore4.14.14.14.14.1
cvss3_meta_basescore4.34.34.34.34.9
cvss3_meta_tempscore4.14.14.14.24.8
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1752876000 (07/19/2025)1752876000 (07/19/2025)1752876000 (07/19/2025)1752876000 (07/19/2025)1752876000 (07/19/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-22006EUVD-2025-22006EUVD-2025-22006
cve_nvd_summaryA vulnerability, which was classified as problematic, has been found in Huashengdun WebSSH up to 1.6.2. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument hostname/port leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability, which was classified as problematic, has been found in Huashengdun WebSSH up to 1.6.2. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument hostname/port leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prNN
cvss4_cna_uiPP
cvss4_cna_vcNN
cvss4_cna_viLL
cvss4_cna_vaNN
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore5.35.3
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prNN
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iLL
cvss3_cna_aNN
cvss3_cna_basescore4.34.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auNN
cvss2_cna_ciNN
cvss2_cna_iiPP
cvss2_cna_aiNN
cvss2_cna_basescore55
cvss3_nvd_aN
cvss3_nvd_basescore6.1
cve_nvd_summaryesSe ha detectado una vulnerabilidad clasificada como problemática en Huashengdun WebSSH hasta la versión 1.6.2. Este problema afecta a una funcionalidad desconocida del componente "Login Page". La manipulación del argumento "hostname/port" provoca ataques de Cross-Site Scripting. El ataque podría ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL

Do you need the next level of professionalism?

Upgrade your account now!