VYPR
Medium severity4.8NVD Advisory· Published Jan 16, 2026· Updated Apr 15, 2026

CVE-2026-20894

CVE-2026-20894

Description

Cross-site scripting vulnerability exists in multiple Network Cameras TRIFORA 3 series provided by TOA Corporation. If an attacking administrator configures the affected product with some malicious input, an arbitrary script may be executed on the web browser of a victim administrator who accesses the setting screen.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored cross-site scripting vulnerability in TOA TRIFORA 3 series network cameras allows an attacker with admin privileges to inject malicious scripts that execute in a victim administrator's browser.

Vulnerability

Overview

CVE-2026-20894 is a cross-site scripting (XSS) vulnerability affecting multiple models in the TOA Corporation TRIFORA 3 series of network cameras. The flaw resides in the camera's configuration interface, where an attacking administrator can inject malicious input that is not properly sanitized. When a victim administrator accesses the affected settings screen, the injected script executes in their browser session [1].

Exploitation and

Attack Surface

Exploitation requires the attacker to already possess administrative privileges on the camera. The attack is performed by configuring the device with crafted input, which is then stored and later rendered to other administrators. The CVSS v3.1 base score is 4.8 (Medium), with the vector AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, indicating network-based on the reference that the attack is network-exploitable, requires high privileges, and depends on user interaction [1].

Impact

A successful attack allows an attacker to execute arbitrary scripts in the context of the victim administrator's web browser. This can lead to session hijacking, defacement of the settings interface, or theft of sensitive information displayed on the screen. The impact is limited to the browser session and does not directly compromise the camera's OS or data [1].

Mitigation

TOA Corporation has released software updates to address this vulnerability. Users are advised to update their TRIFORA 3 series cameras to the latest firmware version as specified in the vendor's advisory. No workarounds are documented, and the vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.