Moxa SDS-3008 Series Multiple Vulnerabilities
SDS-3008 Series firmware v2.2 and prior contain vulnerabilities in an outdated jQuery library that allow Cross-site Scripting (XSS) attacks and prototype pollution. CVEs affected: CVE-2015-9251, CVE-2020-11022, CVE-2020-11023 (XSS), and CVE-2019-11358 (prototype pollution). An attacker can remotely inject HTML or JavaScript via the web interface, causing arbitrary code to execute in an operator's browser session. This could lead to theft of session tokens, credentials, and unauthorized modification of device settings such as port configurations, VLAN assignments, or network access policies. The prototype pollution vulnerability could be leveraged to inject malicious attributes that trigger secondary XSS attacks.
- Network access to the SDS-3008 web interface (HTTP/HTTPS port)
- A user (operator or engineer) must visit a malicious link or be socially engineered while their session is active on the device
- No credentials are required for the initial injection; user interaction is the key prerequisite
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e4c91cce-2026-4b2b-915c-f509408d9e9a