** UNSUPPORTED WHEN ASSIGNED ** webinc/js/info.php on D-Link DIR-816L 2.06.B09_BETA and DIR-803 1.04.B02 devices allows XSS via the HTTP Referer header. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: this is typically not exploitable because of URL encoding (except in Internet Explorer) and because a web page cannot specify that a client should make an additional HTTP request with an arbitrary Referer header.
References
Link | Resource |
---|---|
https://github.com/sek1th/iot/blob/master/DIR-816L_XSS.md | Exploit Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10190 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2020-09-19 13:15
Updated : 2021-04-23 09:59
NVD link : CVE-2020-25786
Mitre link : CVE-2020-25786
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
dlink
- dir-803
- dir-815_firmware
- dir-860l_firmware
- dir-865l
- dir-860l
- dir-815
- dir-816l
- dir-816l_firmware
- dir-645
- dir-645_firmware
- dir-803_firmware
- dir-865l_firmware