The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a reflected cross site scripting (XSS) attack. This allows an attacker on the local network segment to execute arbitrary JavaScript code within the context of the WDU webpage. Full administrator level access to the device is possible. To initiate an exploit of this vulnerability, the victim must execute two actions: (1) view a specific URL served by the WDU, and (2) click an element on the rendered page.
History

Thu, 14 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Garmin
Garmin wdu
Vendors & Products Garmin
Garmin wdu

Thu, 14 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 21:45:00 +0000

Type Values Removed Values Added
Title Local XSS in Garmin WDU Allows Full Admin Access
Weaknesses CWE-79

Wed, 13 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a reflected cross site scripting (XSS) attack. This allows an attacker on the local network segment to execute arbitrary JavaScript code within the context of the WDU webpage. Full administrator level access to the device is possible. To initiate an exploit of this vulnerability, the victim must execute two actions: (1) view a specific URL served by the WDU, and (2) click an element on the rendered page.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-05-13T00:00:00.000Z

Updated: 2026-05-14T12:30:12.604Z

Reserved: 2025-03-09T00:00:00.000Z

Link: CVE-2025-27852

cve-icon Vulnrichment

Updated: 2026-05-14T12:30:06.031Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T21:16:41.350

Modified: 2026-05-14T17:06:08.693

Link: CVE-2025-27852

cve-icon Redhat

No data.