header-logo
Suggest Exploit
vendor:
DG-HR3400 Wireless Router
by:
Adipta Basu
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: DG-HR3400 Wireless Router
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: h:digisol:dg-hr3400_wireless_router
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Mac OS High Sierra
2018

DIGISOL DG-HR3400 Wireless Router – Cross-Site Scripting

A Cross-Site Scripting (XSS) vulnerability was discovered in the DIGISOL DG-HR3400 Wireless Router. By changing the SSID to a malicious script, an attacker can execute arbitrary code on the router. This can be exploited by sending a specially crafted request to the router's web interface.

Mitigation:

To mitigate this vulnerability, users should ensure that the SSID is not set to any malicious scripts.
Source

Exploit-DB raw data:

# Exploit Title: DIGISOL DG-HR3400 Wireless Router -  Cross-Site Scripting
# Date: 2018-06-25
# Vendor Homepage:  http://www.digisol.com
# Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W
# Category: Hardware
# Exploit Author: Adipta Basu
# Tested on: Mac OS High Sierra
# CVE: N/A
 
# Reproduction Steps:
 
   - Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
   - Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
   - Open BurpSuite
   - Change the SSID to "Testing" and hit "Apply"
   - Burp will capture the intercepts.
   - Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is
   - Refresh the page, and you will get the "ADIPTA" pop-up