CVE-2021-20137 Scanner
Detects 'Cross-Site Scripting (XSS)' vulnerability in Gryphon Tower Router affects v. <= 04.0004.12.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 second
Time Interval
4 week
Scan only one
Url
Toolbox
-
Gryphon Tower Router software is a popular router software used in many households and offices to access the internet. The software is known for its high-performance capabilities and seamless functionality, which allows users to connect multiple devices to their network and access the internet without any interruption. It's a wired and wireless router that provides users with high-speed internet access and security features that protect against malware, phishing, and other cyber threats.
Recently, a security vulnerability was discovered in the Gryphon Tower Router software that has been identified as CVE-2021-20137. This vulnerability is a reflected cross-site scripting vulnerability that exists in the URL parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could potentially exploit this issue by tricking a user into clicking on a specially crafted link, which would grant the attacker JavaScript execution capabilities in the context of the victim's browser.
If the vulnerability is successfully exploited, attackers could potentially gain access to sensitive information such as login credentials, financial information, and personal data. They could also use the compromised browser to launch further attacks on other devices connected to the network or use it as a gateway to access other systems. This could ultimately result in significant financial losses and reputational damage for individuals or businesses.
In conclusion, security vulnerabilities can be detrimental to businesses and individuals, leading to significant losses and reputational damage. However, thanks to the pro features of the s4e.io platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. This platform provides users with a comprehensive view of their security posture, allowing for greater visibility and effective vulnerability management. Implementing the necessary security measures and taking proactive steps to manage vulnerabilities is crucial in today's digital landscape.
REFERENCES