An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.

  • Published Date: Tuesday 14th of May 2019 02:29:00 PM
  • Modified Date: Wednesday 15th of May 2019 01:59:52 PM
    • Network Access Vector: The attacker does not require local network access or local access.
    • Authentication Vector: Authentication is not required to access and exploit the vulnerability.
    • Complexity Vector: One instance of complexity is required to access and exploit the vulnerability.
    • Availability Impact: There is no impact to the availability of the system.
    • Integrity Impact: Modification of some system files is posible.
    • Confidentiality Impact: There is none information disclosure.
    • CVSS Score: 4.3
    • Common Platform Enumeration (CPE) Dictionary
      • cpe:2.3:o:ricoh:sp_4510dn_firmware
      • cpe:2.3:h:ricoh:sp_4510dn
    • Reference:

    Download Mageni's Vulnerability Scanning Platform.

    No credit card is required to download the Free Edition. Register now.