ID
VAR-E-202010-0140
TITLE
Genexis Platinum-4410 Cross Site Scripting
Trust: 0.5
DESCRIPTION
The Genexis Platinum-4410 router suffers from a persistent cross site scripting vulnerability.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | genexis | model: | platinum-4410 | scope: | - | version: | - | Trust: 0.5 |
EXPLOIT
# Exploit Title: Persistent XSS in SSID
# Date: 10/24/2020
# Exploit Author: Amal Mohandas
# Vendor Homepage: https://genexis.co.in/product/ont/
# Version: Platinum-4410 Software version - P4410-V2-1.28
# Tested on: Windows 10
Vulnerability Details
======================
Genexis Platinum-4410 Home Gateway Router is vulnerable to stored XSS
in the SSID parameter. This could allow attackers to perform malicious
action in which the XSS popup will affect all privileged users.
How to reproduce
===================
1. Login to the firmware as any user
2. Navigate to Net tab--> WLAN
3. Enter below mentioned payload in "SSID" text box
<script>alert(1)</script>
4. Click on the "OK" button.
5. Relogin as any user and again navigate to Net tab--> WLAN
6. Observe the XSS popup showing persistent XSS
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TYPE
xss
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | xss | Trust: 0.5 |
CREDITS
Amal Mohandas
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 159704 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 159704 |
LAST UPDATE DATE
2022-07-27T09:18:07.785000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 159704 | date: | 2020-10-26T16:37:43 |