Exploiting Stored Cross-Site Scripting at Tenda AC5 AC1200
2021-01-24 18:40:00 Author: www.hackingarticles.in(查看原文) 阅读量:244 收藏

While testing Tenda AC5 AC1200 over at the Hacking Articles Research Lab, we uncovered several vulnerabilities in its latest firmware version V15.03.06.47_multi.

Thereby in a heap of basic vulnerabilities, there was a one with the highest severity i.e. Stored Cross-Site Scripting.

So, let’s take a look at how we detected that.

Detecting & Exploiting the Vulnerability

Navigating the Tenda AC1200 gateway IP i.e. 192.168.0.1 over at our browser, we got landed on the router’s main.html webpage. There we discovered that the Wi-Fi Names are displayed on the screen.

This made us scratch our head and we just switched to the Wifi Settings and hit the Wifi Name and the Password option.

And with that, we tried to manipulate the Wifi name with a Javascript code in order to hit a potential cross-site scripting attack.

<script>alert(1)</script>

Now as soon as the victim navigate back to the dashboard with the gateway IP, the browser executes up the payload dumping “1” as an alert over there.


文章来源: https://www.hackingarticles.in/exploiting-stored-cross-site-scripting-at-tenda-ac5-ac1200/
如有侵权请联系:admin#unsafe.sh