Home

Description

Comodo Dome Firewall 2.7.0 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by submitting crafted input through the device parameter. Attackers can send POST requests to the QoS devices management endpoint with script payloads in the device parameter to execute arbitrary JavaScript in users' browsers.

PUBLISHED Reserved 2026-02-18 | Published 2026-02-19 | Updated 2026-02-19 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

2.7.0
affected

Credits

Ozer Goker finder

References

www.exploit-db.com/exploits/46408 (ExploitDB-46408) exploit

cdome.comodo.com/firewall/ (Comodo Dome Firewall Official Homepage) product

secure.comodo.com/...?pid=106&license=try&track=9278&af=9278 (Comodo Dome Firewall Purchase Page) product

www.vulncheck.com/...oss-site-scripting-via-device-parameter (VulnCheck Advisory: Comodo Dome Firewall 2.7.0 Reflected Cross-Site Scripting via device Parameter) third-party-advisory

cve.org (CVE-2019-25416)

nvd.nist.gov (CVE-2019-25416)

Download JSON