Sploit.io - Search

Product: X-301-I, version: Firmware 1.15

CVE-2023-6333

Severity: HIGH

Description: The affected ControlByWeb Relay products are vulnerable to a stored cross-site scripting vulnerability, which could allow an attacker to inject arbitrary scripts into the endpoint of a web interface that could run malicious javascript code during a user's session.

CVSS Score: 7.5

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000280000
  • Percentile: 0.079980000
  • Date: 2026-04-30

ExploitDB

No data available.

HackerOne Data

  • Rank: 9224
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • ControlByWeb X-332-24I - Versions: Firmware 1.06
    • ControlByWeb X-301-I - Versions: Firmware 1.15
    • ControlByWeb X-301-24I - Versions: Firmware 1.15

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, a stored cross-site scripting (XSS) flaw in ControlByWeb Relay products, presents a HIGH risk. The nature of the vulnerability allows an attacker to inject malicious JavaScript code into the web interface of the affected devices. This code will then execute within the context of a user’s session. The likelihood of exploitation is moderate, requiring a user interaction (clicking a link or submitting a form containing the malicious script), but the privilege required to exploit is high, meaning an authenticated user is needed. Successful exploitation could lead to high impact on confidentiality, as an attacker can potentially steal user credentials or sensitive data displayed on the interface. Integrity is moderately impacted as the attacker can modify data displayed to the user, and availability is slightly impacted, potentially through resource exhaustion or interface disruption. The EPSS score of 0.000280000 suggests a relatively low overall occurrence rate, but the potential impact justifies prompt attention, especially for organizations heavily reliant on these relays.

    2. Potential Attack Scenarios
    An attacker could craft a malicious payload and inject it into a field within the ControlByWeb Relay web interface, such as a description field or a custom setting. Let’s consider a scenario targeting the X-332-24I firmware version 1.06. The attacker gains access to the web interface with a user account having sufficient privileges. They navigate to a section allowing text input, perhaps a configuration description. The attacker injects a JavaScript payload designed to steal the user’s session cookie and send it to an attacker-controlled server. When another user (or the same user in a new session) accesses the page, the malicious JavaScript runs, stealing their session cookie. The attacker can then use this cookie to impersonate the user, gaining access to the ControlByWeb Relay’s functionality with the stolen user's permissions. This could lead to unauthorized control of connected devices or the exfiltration of configuration data.

    3. Mitigation Recommendations
    The primary mitigation is to update the affected ControlByWeb Relay products to the latest firmware versions. ControlByWeb recommends updating X-301 to version 1.20 and X-332 to version 1.09. These updates should address the XSS vulnerability. The firmware updates can be found at the following locations: X301 V1.20 - https://controlbyweb.com/firmware/X301_v1.20_firmware.zip and X332 V1.09 - https://controlbyweb.com/firmware/X332_v1.09_firmware.zip. As an interim measure, before patching, input validation can be enforced on all user-supplied data to sanitize potentially malicious scripts. Users should be cautious when clicking links or submitting forms within the ControlByWeb interface, especially if the source is untrusted. Regularly monitor network traffic for unusual activity that could indicate a successful exploit.

    4. Executive Summary
    ControlByWeb Relay products are vulnerable to a cross-site scripting attack, potentially allowing attackers to steal user credentials and gain unauthorized access to connected devices. This vulnerability affects several models, including the X-301 and X-332, running older firmware versions. The risk is considered HIGH, with potential impacts to data confidentiality, system integrity, and availability. The recommended action is to immediately update to the latest firmware versions (X301 V1.20 and X332 V1.09) to mitigate the risk. This update is critical for organizations relying on these relays to maintain secure control of connected systems and prevent potential disruptions or data breaches. Prompt patching will minimize the window of opportunity for attackers and safeguard critical infrastructure.