D-Link Dir-600M N150 - Cross-Site Scripting

ID EDB-ID:45343
Type exploitdb
Reporter Exploit-DB
Modified 2018-09-06T00:00:00


D-Link Dir-600M N150 - Cross-Site Scripting. Webapps exploit for Hardware platform. Tags: Cross-Site Scripting (XSS)

                                            # Exploit Title: D-Link Dir-600M N150 - Cross-Site Scripting
# Date: 2018-09-06
# Exploit Author: PUNIT DARJI
# Vendor Homepage: www.dlink.co.in
# Hardware Link: https://amzn.to/2NUIniO
# Version: DIR-600M Firmware 3.01
# Tested on: Windows 7 ultimate
# CVE: N/A


Goto your Wifi Router Gateway [i.e: 192.168.X.X ip address of router]
Go to --> "Advance" --> "Dynamic DNS" --> "Hostname"
"Username" --> <script>alert("PunitDarji")</script>
and hit apply Refresh the page, and you will get the 2 pop-up first
"PSYCHO55" and second "PunitDarji".