DIGISOL DG-HR3400 Wireless Router Cross-Site Scripting

2018.06.28
Credit: Adipta Basu
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting # Date: 2018-06-25 # Vendor Homepage:  http://www.digisol.com # Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W # Category: Hardware # Exploit Author: Adipta Basu # Tested on: Mac OS High Sierra # CVE: N/A   # Reproduction Steps:      - Goto your Wifi Router Gateway [i.e: http://192.168.2.1]    - Go to --> "General Setup" --> "Wireless" --> "Basic Settings"    - Open BurpSuite - Change the SSID to "Testing" and hit "Apply" - Burp will capture the intercepts. - Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is - Refresh the page, and you will get the "ADIPTA" pop-up


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top