Lucene search

K
zdtSajibe Kanti1337DAY-ID-29718
HistoryFeb 06, 2018 - 12:00 a.m.

Netis WF2419 Router - Cross-Site Scripting Vulnerability

2018-02-0600:00:00
Sajibe Kanti
0day.today
43

0.001 Low

EPSS

Percentile

44.7%

Exploit for hardware platform in category web applications

# Exploit Title: Netis-WF2419 HTML Injection
# Exploit Author: Sajibe Kanti
# Author Contact :https://twitter.com/@sajibekantibd
# Vendor Homepage: http://www.netis-systems.com/
# Version: Netis-WF2419 , V3.2.41381
# Tested on: Windows 10
 
# CEV : CVE-2018-6190
 
 
 HTML Injection in Netis-WF2419
 
 
 
Netis-WF2419 is prone to an HTML-injection vulnerability because it fails
to sufficiently sanitize user-supplied data.
 
Attacker-supplied HTML or script code could run in the context of the
affected site, potentially allowing the attacker to steal cookie-based
authentication credentials and control how the site is rendered to the
user; other attacks are also possible.
 
Netis-WF2419 is vulnerable;
 
Proof of Concept:
 
1. Go to your wireless router ip (ex. 192.168.0.1)
 
2. Go to Wireless Settings - tab
 
3. Now Click MAC Filtering -tab
 
4.Write  MAC Address and in -Description- write (<h1>XSS-PWD</h1>)
 
5.Click Add
 
6. Now You Can See HTML Injection
 
 
 
#Solution:
 
 Upgrade Firmware

#  0day.today [2018-02-06]  #

0.001 Low

EPSS

Percentile

44.7%