ID

VAR-E-201904-0091


CVE

cve_id:CVE-2019-11017

Trust: 1.5

sources: PACKETSTORM: 152465 // EXPLOIT-DB: 46687

EDB ID

46687


TITLE

D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 46687

DESCRIPTION

D-Link DI-524 V2.06RU - Multiple Cross-Site Scripting. CVE-2019-11017 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 46687

AFFECTED PRODUCTS

vendor:d linkmodel:di-524 v2.06ruscope: - version: -

Trust: 1.6

vendor:d linkmodel:di-524 2.06ruscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 152465 // EXPLOIT-DB: 46687 // EDBNET: 101309

EXPLOIT

# Exploit Title: Multiple Stored and Reflected XSS vulnerabilities in D-Link DI-524
# Date: April 6, 2019
# Exploit Author: Semen Alexandrovich Lyhin (https://www.linkedin.com/in/semenlyhin/)
# Vendor Homepage: https://www.dlink.com
# Version: D-Link DI-524 - V2.06RU
# CVE : CVE-2019-11017

To re-create Reflected XSS vulnerability, log in to the Web Configuration (default credentials are: "admin":"" without double quotes), and send GET request to the router with malformed vulnerable parameter:

http://$IP/cgi-bin/smap?RC=@smap%22-$PAYLOAD-%22&rd=x&SEO=o&AC=O&SnO=1&SHO=2&StO=1&SpO=1&SPO=1

Where $IP may be equal to "192.168.0.1", $PAYLOAD may be equal to "alert(document.location)".

Stored XSS's were found in web forms on pages /spap.htm, /smap.htm. To inject malicious JavaScript to victim's webpage, an attacker should authorize on the router, then put a payload to any of the vulnerable forms, and wait, until victim opens router's web interface and goes to vulnerable page.

I haven't tested all the admin panel of the router, so I can guess that there are other XSS vulnerabilities in this router.

Trust: 1.0

sources: EXPLOIT-DB: 46687

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 46687

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 46687

TYPE

Multiple Cross-Site Scripting

Trust: 1.6

sources: EXPLOIT-DB: 46687 // EDBNET: 101309

TAGS

tag:Cross-Site Scripting (XSS)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:xss

Trust: 0.5

sources: PACKETSTORM: 152465 // EXPLOIT-DB: 46687

CREDITS

Semen Alexandrovich Lyhin

Trust: 0.6

sources: EXPLOIT-DB: 46687

EXTERNAL IDS

db:EXPLOIT-DBid:46687

Trust: 1.6

db:NVDid:CVE-2019-11017

Trust: 1.5

db:EDBNETid:101309

Trust: 0.6

db:PACKETSTORMid:152465

Trust: 0.5

sources: PACKETSTORM: 152465 // EXPLOIT-DB: 46687 // EDBNET: 101309

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-11017

Trust: 1.5

url:https://www.exploit-db.com/exploits/46687/

Trust: 0.6

sources: PACKETSTORM: 152465 // EXPLOIT-DB: 46687 // EDBNET: 101309

SOURCES

db:PACKETSTORMid:152465
db:EXPLOIT-DBid:46687
db:EDBNETid:101309

LAST UPDATE DATE

2022-07-27T09:26:51.861000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:152465date:2019-04-10T15:08:09
db:EXPLOIT-DBid:46687date:2019-04-10T00:00:00
db:EDBNETid:101309date:2019-04-10T00:00:00