D-Link DIR-600M Wireless – Cross-Site Scripting

  • 作者: Prasenjit Kanti Paul
    日期: 2018-03-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/44219/
  • ########################################################################
    # Exploit Title: D-Link DIR-600M Wireless - Persistent Cross Site Scripting
    # Date: 11.02.2018
    # Vendor Homepage:http://www.dlink.co.in
    # Hardware Link: http://www.dlink.co.in/products/?pid=DIR-600M
    # Category: Hardware
    # Exploit Author: Prasenjit Kanti Paul
    # Web: http://hack2rule.wordpress.com/
    # Hardware Version: C1
    # Firmware version: 3.01
    # Tested on: Linux Mint
    # CVE: CVE-2018-6936
    ##########################################################################
    
    Reproduction Steps:
    
     - Goto your wifi router gateway [i.e: http://192.168.0.1]
     - Go to --> "Maintainence" --> "Admin"
     - Create a user with name "<script>alert("PKP")</script>"
     - Refresh the page and you will be having "PKP" popup
    
    Note: It can also be done by changing SSID name to "<script>alert("PKP")</script>"