vendor:
DI-524
by:
Semen Alexandrovich Lyhin
4.8
CVSS
MEDIUM
Stored and Reflected XSS
79
CWE
Product Name: DI-524
Affected Version From: V2.06RU
Affected Version To: V2.06RU
Patch Exists: YES
Related CWE: CVE-2019-11017
CPE: h:d-link:di-524
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2019
Multiple Stored and Reflected XSS vulnerabilities in D-Link DI-524
To re-create Reflected XSS vulnerability, log in to the Web Configuration (default credentials are: "admin":"" without double quotes), and send GET request to the router with malformed vulnerable parameter: http://$IP/cgi-bin/smap?RC=@smap%22-$PAYLOAD-%22&rd=x&SEO=o&AC=O&SnO=1&SHO=2&StO=1&SpO=1&SPO=1 Where $IP may be equal to "192.168.0.1", $PAYLOAD may be equal to "alert(document.location)". Stored XSS's were found in web forms on pages /spap.htm, /smap.htm. To inject malicious JavaScript to victim's webpage, an attacker should authorize on the router, then put a payload to any of the vulnerable forms, and wait, until victim opens router's web interface and goes to vulnerable page.
Mitigation:
Ensure that user input is properly validated and sanitized before being used in web applications.