Lucene search

K
packetstorm0x783PACKETSTORM:173029
HistoryJun 20, 2023 - 12:00 a.m.

Tenda AC6 AC1200 15.03.06.50_multi Cross Site Scripting

2023-06-2000:00:00
0x783
packetstormsecurity.com
193
tenda
ac6
ac1200
router
stored
cross-site scripting
parental control
deviceid
parameter
vulnerability
webserver
burpsuite
javascript
pop-up
cve-2022-40010

0.001 Low

EPSS

Percentile

25.3%

`# Exploit Title: Stored Cross-Site scripting in the Tenda router via the deviceId parameter in the Parental Control module  
# Google Dork: None.  
# Date: Aug-30-2022  
# Exploit Author: 0x783  
# Vendor Homepage: https://tendacn.com/default.html  
# Software Link: https://www.tendacn.com/product/download/AC6.html  
# Version: AC6 AC1200 Smart Dual-Band WiFi Router - V15.03.06.50_multi  
# Tested on: Linux 5.15.0-58-generic  
# CVE : CVE-2022-40010  
-------------------------------------------------------------------------  
  
# 1. Technical Description:  
Tenda AC6 AC1200 Smart Dual-Band WiFi Router V15.03.06.50 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the deviceId parameter in the parental control section.  
  
# Steps to reproduce:  
1- Navigate to the router webserver usually at "http://192.168.0.1", or whatever the address of the router is.  
2- Navigate to the parental control section from the side bar.  
3- Add a new device to the list with any fake MAC address, device name, URL.  
4- Intercept the request using burpsuite and change the "deviceId" parameter to any javascript code (EX: <script>alert(document.domain")</script>).  
5- A pop-up with the domain should appear.  
`

0.001 Low

EPSS

Percentile

25.3%

Related for PACKETSTORM:173029