PatchSiren cyber security CVE debrief
CVE-2013-5223 D-Link CVE debrief
CVE-2013-5223 is a cross-site scripting issue affecting the D-Link DSL-2760U gateway and is included in CISA's Known Exploited Vulnerabilities catalog. For defenders, the practical takeaway is straightforward: treat this as an active remediation item, confirm whether any DSL-2760U devices are in use, and apply vendor updates as directed. The supplied corpus does not include a CVSS score, so prioritization here should be driven by CISA's KEV status and local exposure.
- Vendor
- D-Link
- Product
- DSL-2760U
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-03-25
- Original CVE updated
- 2022-03-25
- Advisory published
- 2022-03-25
- Advisory updated
- 2022-03-25
Who should care
Network administrators, IT operations, and security teams responsible for D-Link DSL-2760U gateways should pay attention, especially if any devices are internet-facing or broadly accessible on internal networks.
Technical summary
The supplied CISA KEV entry identifies CVE-2013-5223 as a D-Link DSL-2760U gateway cross-site scripting vulnerability. CISA records the product as DSL-2760U, marks the issue as known exploited, and lists the required action as applying updates per vendor instructions. No CVSS score or exploit specifics are provided in the supplied corpus.
Defensive priority
High. Inclusion in CISA's Known Exploited Vulnerabilities catalog indicates this issue should be treated as urgent remediation work, with attention to the CISA due date in the supplied timeline.
Recommended defensive actions
- Apply updates per vendor instructions.
- Inventory all D-Link DSL-2760U devices to confirm whether the vulnerable product is present.
- Prioritize remediation against the CISA KEV due date of 2022-04-15 if any devices remain unpatched.
- If immediate updating is not possible, restrict access to affected gateways using approved network controls and local change-management processes.
- Verify remediation after patching and document any exceptions or compensating controls.
Evidence notes
This debrief is based on the supplied CISA KEV source item and the official CVE/NVD reference links. The corpus provides the vulnerability name, product, KEV status, date added, due date, and required action. It does not provide CVSS scoring or exploit mechanics, so no additional technical claims are made here.
Official resources
-
CVE-2013-5223 CVE record
CVE.org
-
CVE-2013-5223 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Public debrief based on the supplied CISA KEV entry and official reference links. The corpus timing used here is the provided public record date of 2022-03-25; this should not be confused with the original flaw discovery date.