{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-53701","assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","state":"PUBLISHED","assignerShortName":"CERT-PL","dateReserved":"2025-07-08T14:49:12.283Z","datePublished":"2025-10-23T13:39:46.472Z","dateUpdated":"2025-10-23T14:56:20.217Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"VS-IPC1002","vendor":"Vilar","versions":[{"status":"affected","version":"1.1.0.18","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Szymon Paszun"}],"datePublic":"2025-10-23T14:10:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Vilar </span><span style=\"background-color: rgb(255, 255, 255);\">VS-IPC1002 <span style=\"background-color: rgb(255, 255, 255);\">IP cameras are <span style=\"background-color: rgb(255, 255, 255);\">vulnerable to Reflected XSS (Cross-site Scripting) </span><span style=\"background-color: rgb(255, 255, 255);\">attacks, because parameters in </span><span style=\"background-color: rgb(255, 255, 255);\">GET requests sent to /cgi-bin</span>/action endpoint are not sanitized properly, making it possible to target logged in admin users.</span></span><br>The vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well."}],"value":"Vilar VS-IPC1002 IP cameras are vulnerable to Reflected XSS (Cross-site Scripting) attacks, because parameters in GET requests sent to /cgi-bin/action endpoint are not sanitized properly, making it possible to target logged in admin users.\nThe vendor did not respond in any way. Only version 1.1.0.18 was tested, other versions might be vulnerable as well."}],"impacts":[{"capecId":"CAPEC-591","descriptions":[{"lang":"en","value":"CAPEC-591 Reflected XSS"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":4.8,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL","dateUpdated":"2025-10-23T13:39:46.472Z"},"references":[{"url":"https://cert.pl/en/posts/2025/10/CVE-2025-53701"}],"source":{"discovery":"EXTERNAL"},"tags":["unsupported-when-assigned"],"title":"XSS vulnerability in Vilar VS-IPC1002 IP cameras","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-23T14:56:06.990606Z","id":"CVE-2025-53701","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-23T14:56:20.217Z"}}]}}