On Netis DL4323 devices, XSS exists via the form2Ddns.cgi username parameter (DynDns settings of the Dynamic DNS Configuration).
References
Link | Resource |
---|---|
https://drive.google.com/open?id=1i5gIrJRy5L7lTIsYZp9GsvR8ZGCWtnMj | Exploit Third Party Advisory |
https://drive.google.com/open?id=1HrYqVKlSxhQqB5tNhhLIgpyfi0Y2ZL80 | Exploit Third Party Advisory |
https://fatihhcelik.blogspot.com/2019/12/stored-xss-on-username-input-2-netis.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-12-29 16:15
Updated : 2020-01-02 12:12
NVD link : CVE-2019-20076
Mitre link : CVE-2019-20076
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
netis-systems
- dl4343
- dl4343_firmware