Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1257 articles · 102140 vulns · 38/41 feeds (7d)
← Back to list
6.4
CVE-2026-34802EXPLOITED
endian · endian firewall

Endian Firewall /cgi-bin/salearn.cgi remark user ham spam Stored Cross-Site Scripting

Description

A vulnerability was found in Endian Firewall 3.3.25. It has been classified as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/salearn.cgi of the component Parameter Handler. The manipulation of the argument spam leads to cross site scripting. This vulnerability is referenced as CVE-2026-34802. Remote exploitation of the attack is possible.

Affected Products

VendorProductVersions
endianendian firewall3.3.25

References

  • https://help.endian.com/hc/en-us/sections/360004371358-Community(release-notes)
  • https://www.vulncheck.com/advisories/endian-firewall-cgi-bin-salearn-cgi-remark-user-ham-spam-stored-cross-site-scripting(third-party-advisory)

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-34802 | Endian Firewall 3.3.25 Parameter /cgi-bin/salearn.cgi spam cross site scripting
→ No new info (linked only)
CVSS 3.16.4 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-79
PublishedApr 2, 2026
Last enriched4h agov2
Trending Score42
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-34814EXP
Endian Firewall /cgi-bin/proxygroup.cgi group Stored Cross-Site Scripting
Trending: 46
HIGHCVE-2026-34796EXP
Endian Firewall /cgi-bin/logs_openvpn.cgi DATE Perl Command Injection
Trending: 46
HIGHCVE-2026-34790EXP
Endian Firewall /cgi-bin/backup.cgi remove ARCHIVE Directory Traversal
Trending: 46
NONECVE-2026-34797EXP
Endian Firewall /cgi-bin/logs_smtp.cgi DATE Perl Command Injection
Trending: 44
NONECVE-2026-34791EXP
Endian Firewall /cgi-bin/logs_proxy.cgi DATE Perl Command Injection
Trending: 44

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 2, 2026
Discovered by ZDM
Apr 2, 2026
Actively Exploited
Apr 2, 2026
Updated: description, severity, activelyExploited
Apr 2, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated description with more technical detail, changed severity to HIGH, and noted that the vulnerability is actively exploited.

descriptionseverityactivelyExploited
via VulDB
v14h ago

Initial creation