Required CVE Record Information
Description
The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
5.5 | MEDIUM | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L |
Product Status
Learn moreVersions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
Versions 1 Total
Default Status: unknown
affected
References 1 Total
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 1 Total
- psirt.bosch.com: https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html vendor-advisoryx_transferred