ID

VAR-E-202010-0140


TITLE

Genexis Platinum-4410 Cross Site Scripting

Trust: 0.5

sources: PACKETSTORM: 159704

DESCRIPTION

The Genexis Platinum-4410 router suffers from a persistent cross site scripting vulnerability.

Trust: 0.5

sources: PACKETSTORM: 159704

AFFECTED PRODUCTS

vendor:genexismodel:platinum-4410scope: - version: -

Trust: 0.5

sources: PACKETSTORM: 159704

EXPLOIT

# Exploit Title: Persistent XSS in SSID
# Date: 10/24/2020
# Exploit Author: Amal Mohandas
# Vendor Homepage: https://genexis.co.in/product/ont/
# Version: Platinum-4410 Software version - P4410-V2-1.28
# Tested on: Windows 10

Vulnerability Details
======================
Genexis Platinum-4410 Home Gateway Router is vulnerable to stored XSS
in the SSID parameter. This could allow attackers to perform malicious
action in which the XSS popup will affect all privileged users.

How to reproduce
===================
1. Login to the firmware as any user
2. Navigate to Net tab--> WLAN
3. Enter below mentioned payload in "SSID" text box
<script>alert(1)</script>
4. Click on the "OK" button.
5. Relogin as any user and again navigate to Net tab--> WLAN
6. Observe the XSS popup showing persistent XSS

Trust: 0.5

sources: PACKETSTORM: 159704

EXPLOIT HASH

LOCAL

SOURCE

md5: 5d147e29e3e030bcabaa031d03bd5deb
sha-1: aebea24b1e136a0eb5b5a2be7393e9e8853e8a5e
sha-256: 72ed9adc3e243643cdf20bf12709d7303e1ba8ca4d2de6746732c95ca2f9a510
md5: 5d147e29e3e030bcabaa031d03bd5deb

Trust: 0.5

sources: PACKETSTORM: 159704

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 159704

TYPE

xss

Trust: 0.5

sources: PACKETSTORM: 159704

TAGS

tag:exploit

Trust: 0.5

tag:xss

Trust: 0.5

sources: PACKETSTORM: 159704

CREDITS

Amal Mohandas

Trust: 0.5

sources: PACKETSTORM: 159704

EXTERNAL IDS

db:PACKETSTORMid:159704

Trust: 0.5

sources: PACKETSTORM: 159704

SOURCES

db:PACKETSTORMid:159704

LAST UPDATE DATE

2022-07-27T09:18:07.785000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:159704date:2020-10-26T16:37:43