{"api_version":"1","generated_at":"2026-04-26T16:46:29+00:00","cve":"CVE-2013-3065","urls":{"html":"https://cve.report/CVE-2013-3065","api":"https://cve.report/api/cve/CVE-2013-3065.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2013-3065","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2013-3065"},"summary":{"title":"CVE-2013-3065","description":"Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2014-09-29 22:55:00","updated_at":"2014-09-30 18:25:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf","name":"http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf","refsource":"MISC","tags":["Exploit"],"title":"","mime":"application/pdf","httpstatus":"-1","archivestatus":"200"},{"url":"http://securityevaluators.com/knowledge/case_studies/routers/linksys_ea6500.php","name":"http://securityevaluators.com/knowledge/case_studies/routers/linksys_ea6500.php","refsource":"MISC","tags":["Exploit"],"title":"Linksys EA6500 Hacked, Rooted by ISE","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2013-3065","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3065","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2013","cve_id":"3065","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"linksys","cpe5":"ea6500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"3065","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"linksys","cpe5":"ea6500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"3065","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linksys","cpe5":"ea6500_firmware","cpe6":"1.1.28.147876","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"3065","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linksys","cpe5":"ea6500_firmware","cpe6":"1.1.28.147876","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2013-3065","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf","refsource":"MISC","url":"http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf"},{"name":"http://securityevaluators.com/knowledge/case_studies/routers/linksys_ea6500.php","refsource":"MISC","url":"http://securityevaluators.com/knowledge/case_studies/routers/linksys_ea6500.php"}]}},"nvd":{"publishedDate":"2014-09-29 22:55:00","lastModifiedDate":"2014-09-30 18:25:00","problem_types":["CWE-79"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linksys:ea6500_firmware:1.1.28.147876:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:h:linksys:ea6500:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2013","CveId":"3065","Ordinal":"62709","Title":"CVE-2013-3065","CVE":"CVE-2013-3065","Year":"2013"},"notes":[{"CveYear":"2013","CveId":"3065","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in the Parental Controls section in Linksys EA6500 with firmware 1.1.28.147876 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to the Blocked Specific Sites section.","Type":"Description","Title":null},{"CveYear":"2013","CveId":"3065","Ordinal":"2","NoteData":"2014-09-29","Type":"Other","Title":"Published"},{"CveYear":"2013","CveId":"3065","Ordinal":"3","NoteData":"2014-09-29","Type":"Other","Title":"Modified"}]}}}