Peplink NGxxx/LCxxx VPN-Firewall...

- AV AC AU C I A
发布: 2016-11-29
修订: 2025-04-13

Input passed via the '_redirect' GET parameter via 'service.cgi' script on various Peplink VPN-Firewall devices is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息