PatchSiren

PatchSiren cyber security CVE debrief

CVE-2013-5223 D-Link CVE debrief

CVE-2013-5223 is a cross-site scripting issue affecting the D-Link DSL-2760U gateway and is included in CISA's Known Exploited Vulnerabilities catalog. For defenders, the practical takeaway is straightforward: treat this as an active remediation item, confirm whether any DSL-2760U devices are in use, and apply vendor updates as directed. The supplied corpus does not include a CVSS score, so prioritization here should be driven by CISA's KEV status and local exposure.

Vendor
D-Link
Product
DSL-2760U
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-03-25
Original CVE updated
2022-03-25
Advisory published
2022-03-25
Advisory updated
2022-03-25

Who should care

Network administrators, IT operations, and security teams responsible for D-Link DSL-2760U gateways should pay attention, especially if any devices are internet-facing or broadly accessible on internal networks.

Technical summary

The supplied CISA KEV entry identifies CVE-2013-5223 as a D-Link DSL-2760U gateway cross-site scripting vulnerability. CISA records the product as DSL-2760U, marks the issue as known exploited, and lists the required action as applying updates per vendor instructions. No CVSS score or exploit specifics are provided in the supplied corpus.

Defensive priority

High. Inclusion in CISA's Known Exploited Vulnerabilities catalog indicates this issue should be treated as urgent remediation work, with attention to the CISA due date in the supplied timeline.

Recommended defensive actions

  • Apply updates per vendor instructions.
  • Inventory all D-Link DSL-2760U devices to confirm whether the vulnerable product is present.
  • Prioritize remediation against the CISA KEV due date of 2022-04-15 if any devices remain unpatched.
  • If immediate updating is not possible, restrict access to affected gateways using approved network controls and local change-management processes.
  • Verify remediation after patching and document any exceptions or compensating controls.

Evidence notes

This debrief is based on the supplied CISA KEV source item and the official CVE/NVD reference links. The corpus provides the vulnerability name, product, KEV status, date added, due date, and required action. It does not provide CVSS scoring or exploit mechanics, so no additional technical claims are made here.

Official resources

Public debrief based on the supplied CISA KEV entry and official reference links. The corpus timing used here is the provided public record date of 2022-03-25; this should not be confused with the original flaw discovery date.