漏洞概要

漏洞标题:
DIGISOL DG-HR3400 Wireless Router – Cross-Site Scripting

提交时间:
2018-06-28

危害等级:

相关厂商:

漏洞分类:
exp公布

关注度:
共 19 人关注

漏洞详情

EDB-ID: 44955 Author: Adipta Basu Published: 2018-06-28
CVE: N/A Type: Webapps Platform: Hardware
Aliases:
N/A
Advisory/Source: N/A Tags:
Cross-Site Scripting (XSS)

E-DB Verified:
<a href="javascript:void(0);" data-trigger="focus" data-toggle="popover" data-placement="top" data-content='We make an effort to verify exploits (verifty) in our labs, when possible. A “non verified” exploit (marked by a clock icon clock) simply means we did not have the opportunity to test the exploit internally.’>
Waiting verification

Exploit:

Download Exploit Code Download

/

View Raw

Vulnerable App:
N/A
# Exploit Title: DIGISOL DG-HR3400 Wireless Router -  Cross-Site Scripting
# Date: 2018-06-25
# Vendor Homepage:  http://www.digisol.com
# Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W
# Category: Hardware
# Exploit Author: Adipta Basu
# Tested on: Mac OS High Sierra
# CVE: N/A
 
# Reproduction Steps:
 
   - Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
   - Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
   - Open BurpSuite
   - Change the SSID to "Testing" and hit "Apply"
   - Burp will capture the intercepts.
   - Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is
   - Refresh the page, and you will get the "ADIPTA" pop-up

发表评论

电子邮件地址不会被公开。 必填项已用*标注