The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a reflected cross site scripting (XSS) attack. This allows an attacker on the local network segment to execute arbitrary JavaScript code within the context of the WDU webpage. Full administrator level access to the device is possible. To initiate an exploit of this vulnerability, the victim must execute two actions: (1) view a specific URL served by the WDU, and (2) click an element on the rendered page.
Metrics
Affected Vendors & Products
References
History
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Garmin
Garmin wdu |
|
| Vendors & Products |
Garmin
Garmin wdu |
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local XSS in Garmin WDU Allows Full Admin Access | |
| Weaknesses | CWE-79 |
Wed, 13 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a reflected cross site scripting (XSS) attack. This allows an attacker on the local network segment to execute arbitrary JavaScript code within the context of the WDU webpage. Full administrator level access to the device is possible. To initiate an exploit of this vulnerability, the victim must execute two actions: (1) view a specific URL served by the WDU, and (2) click an element on the rendered page. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-13T00:00:00.000Z
Updated: 2026-05-14T12:30:12.604Z
Reserved: 2025-03-09T00:00:00.000Z
Link: CVE-2025-27852
Updated: 2026-05-14T12:30:06.031Z
Status : Awaiting Analysis
Published: 2026-05-13T21:16:41.350
Modified: 2026-05-14T17:06:08.693
Link: CVE-2025-27852
No data.
ReportizFlow