Exploit D-Link AirPlus DI-614+ / DI-624 / DI-704 - DHCP Log HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24226
Проверка EDB
  1. Пройдено
Автор
C3RB3R
Тип уязвимости
REMOTE
Платформа
HARDWARE
CVE
cve-2004-0615
Дата публикации
2004-06-21
Код:
source: https://www.securityfocus.com/bid/10587/info

It is reported that the DI-614+, DI-704, and the DI-624 are susceptible to an HTML injection vulnerability in their DHCP log.

An attacker who has access to the wireless, or internal network segments of the router can craft malicious DHCP hostnames, that when sent to the router, will be logged for later viewing by the administrator of the device.

The injected HTML can be used to cause the administrator to make unintended changes to the configuration of the router. Other attacks may be possible.

Although only the DI-614+, DI-704, and the DI-624 are reported vulnerable, code reuse across devices is common and other products may also be affected.

By sending four requests, all containing hostnames like the following, a complete HTML tag would be rendered, instructing the browser to request the 'restore.cgi' file.
<iframe id='
' height=0 id='
' width=0 id='
' src='restore.cgi'>
 
Источник
www.exploit-db.com

Похожие темы