CVE-2019-25394

Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulnerabilities in the modem.cgi script that allow attackers to inject malicious scripts through POST parameters. Attackers can submit crafted payloads in parameters like INIT, HANGUP, SPEAKER_ON, SPEAKER_OFF, TONE_DIAL, and PULSE_DIAL to execute arbitrary JavaScript in users' browsers when the stored data is retrieved.
Configurations

Configuration 1 (hide)

cpe:2.3:o:smoothwall:smoothwall_express:3.1:sp4:*:*:-:*:*:*

History

20 Feb 2026, 16:31

Type Values Removed Values Added
References () http://www.smoothwall.org - () http://www.smoothwall.org - Product
References () https://www.exploit-db.com/exploits/46333 - () https://www.exploit-db.com/exploits/46333 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/smoothwall-express-modemcgi-cross-site-scripting - () https://www.vulncheck.com/advisories/smoothwall-express-modemcgi-cross-site-scripting - Broken Link
CPE cpe:2.3:o:smoothwall:smoothwall_express:3.1:sp4:*:*:-:*:*:*
First Time Smoothwall smoothwall Express
Smoothwall

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Smoothwall Express 3.1-SP4-polar-x86_64-update9 contiene múltiples vulnerabilidades de cross-site scripting almacenado en el script modem.cgi que permiten a los atacantes inyectar scripts maliciosos a través de parámetros POST. Los atacantes pueden enviar cargas útiles manipuladas en parámetros como INIT, HANGUP, SPEAKER_ON, SPEAKER_OFF, TONE_DIAL y PULSE_DIAL para ejecutar JavaScript arbitrario en los navegadores de los usuarios cuando se recuperan los datos almacenados.

16 Feb 2026, 18:19

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-16 18:19

Updated : 2026-02-20 16:31


NVD link : CVE-2019-25394

Mitre link : CVE-2019-25394

CVE.ORG link : CVE-2019-25394


JSON object : View

Products Affected

smoothwall

  • smoothwall_express
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')