CVE-2022-50801
Description
JM-DATA ONU JF511-TV version 1.0.67 is vulnerable to authenticated stored cross-site scripting (XSS) attacks, allowing attackers with authenticated access to inject malicious scripts that will be executed in other users' browsers when they view the affected content.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
JM-DATA ONU JF511-TV versions 1.0.55 through 1.0.67 contain an authenticated stored XSS vulnerability in the URL filter configuration form.
Vulnerability
Overview
The JM-DATA ONU JF511-TV, a GEPON home and business gateway, is vulnerable to authenticated stored cross-site scripting (XSS) in versions 1.0.55, 1.0.62, and 1.0.67 [1][2]. The vulnerability resides in the /boaform/admin/formURL endpoint, where the url parameter is not properly sanitized before being stored and later rendered in the URL filter configuration page (/secu_urlfilter_cfg_en.asp) [2]. This allows an attacker with valid credentials to inject arbitrary HTML or JavaScript code.
Exploitation
Details
An attacker must first authenticate to the device's web interface. The default credentials are user:user [2]. Once logged in, the attacker can craft a POST request to the vulnerable form, embedding a malicious payload in the url parameter. For example, the payload '>' will be stored and executed when any other authenticated user views the URL filter configuration page [2]. The attack does not require any special privileges beyond a standard user account.
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of another administrator's browser session. This can lead to session hijacking, theft of authentication cookies, or further manipulation of the device's configuration through actions performed on behalf of the victim [1][4]. The CVSS v3 base score is 4.3 (Medium), reflecting the need for authenticated access and user interaction [4].
Mitigation
As of the publication date (2025-12-30), no official patch has been released by JM-DATA [3]. The vendor's website does not mention a fix or updated firmware [3]. Users are advised to change default credentials immediately, restrict network access to the management interface, and monitor for any vendor updates. The vulnerability disclosures or firmware updates [1][2].
- Zero Science Lab — Macedonian Information Security Research & Development Laboratory
- JM-DATA ONU JF511-TV 1.0.67 / 1.0.62 / 1.0.55 XSS / CSRF / Open Redirect
- Innovative IT-Lösungen für Provider & Unternehmen | JM-DATA
- JM-DATA ONU JF511-TV 1.0.67 Authenticated Stored Cross-Site Scripting (XSS) Vulnerability
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0.67
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- cxsecurity.com/issue/WLB-2022060058nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/229343nvd
- packetstormsecurity.com/files/167487/nvd
- www.jm-data.comnvd
- www.vulncheck.com/advisories/jm-data-onu-jf-tv-authenticated-stored-cross-site-scripting-xss-vulnerabilitynvd
- www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5708.phpnvd
News mentions
0No linked articles in our index yet.