header-logo
Suggest Exploit
vendor:
DG-BR4000NG
by:
Adipta Basu
6.1
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: DG-BR4000NG
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2018-12705
CPE: h:digisol:dg-br4000ng
Metasploit: N/A
Platforms Tested: Mac OS High Sierra
2018

DIGISOL DG-BR4000NG – Cross-Site Scripting

DIGISOL DG-BR4000NG is vulnerable to Cross-Site Scripting (XSS) attack. An attacker can inject malicious JavaScript code into the SSID field of the router's web interface, which will be executed when a user visits the page. This can be exploited to steal user credentials, hijack user sessions, redirect users to malicious websites, etc.

Mitigation:

To mitigate this vulnerability, users should ensure that they are running the latest version of the firmware and should not visit untrusted websites.
Source

Exploit-DB raw data:

# Exploit Title: DIGISOL DG-BR4000NG - Cross-Site Scripting
# Date: 2018-06-24
# Vendor Homepage:  http://www.digisol.com
# Hardware Link: https://www.amazon.in/Digisol-DG-BR4000NG-Wireless-Broadband-802-11n/dp/B00A19EHYK
# Category: Hardware
# Exploit Author: Adipta Basu
# Contact : https://www.facebook.com/AdiptaBasu
# Web: https://hackings8n.blogspot.com
# Tested on: Mac OS High Sierra
# CVE: CVE-2018-12705
 
# Reproduction Steps:
 
- Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
- Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
- Open BurpSuite
- Change the SSID to "Testing" and hit "Apply"
- Burp will capture the intercepts.
- Now change the SSID to <script>alert("ADIPTA")</script>
- Refresh the page, and you will get the "ADIPTA" pop-up