This CHT Posted November 4, 2022 Group: The leader of the Content Count: 4,798 Achievement Points: 31,700 With Us For: 233 Days Status: Offline Last Seen: May 19 Device: Windows Share Posted November 4, 2022 # Exploit Title: Genexis Platinum-4410 P4410-V2-1.31A - 'start_addr' Persistent Cross-Site Scripting # Date: 03/25/2020 # Exploit Author: Jithin KS # Vendor Homepage: https://www.gxgroup.eu/ont-products/ # Version: Platinum-4410 Software version - P4410-V2-1.31A # Tested on: Windows 10 # Author Contact: hhttps://twitter.com/jithinks_8<https://twitter.com/amalmohandas0> Vulnerability Details ====================== Genexis Platinum-4410 Home Gateway Unit is vulnerable to stored XSS in the "start_addr" parameter. This could allow attackers to perform malicious action in which the XSS popup will affect all privileged users. How to reproduce =================== 1. Login to the firmware as any user 2. Navigate to Manage tab--> Security Management 3. Enter any valid value in Start Source Address and fill all other fields. Click Add. 4. Capture this request in Burp Suite. Enter payload <script>alert(1)</script> in "start_addr" text box and forward the request. 5. Relogin as any user and again navigate to Manage tab--> Security Management 6. Observe the XSS popup showing persistent XSS Link to comment Share on other sites More sharing options...
Recommended Posts