CVE-2018-12705 : DIGISOL WIRELESS ROUTER DG-BR4000NG XSS PROOF OF CONCEPT
CVE-2018-12705 discovered by ICSS team member Adipta Basu who is our ex-student and presently working as a faculty member with us. The Exploit is published on Exploit-DB on 25-06-2018. It’s an achievement for Indian Cyber Security Solutions. The Exploit details are as follows:
Exploit Title: DIGISOL DG-BR4000NG – Cross-Site Scripting
Author: Adipta Basu
The Specified router founded as vulnerable to Cross-Site Scripting. This vulnerability is still a zero day, being 24th of June 2018. To exploit the vulnerability, the following steps were taken:
Connect to the Wifi network and open the Gateway. Done it by opening 192.168.2.1 .
Press General Setup and change the SSID to something else that can be accepted. setted it as “testing”.
Open BurpSuite and the change the proxy settings of the internet browser so that Burp can intercept the data. After that hit apply on the Digisol page that is already open.
Now Burp will intercept the data, and now just change the SSID parameter form “testing” to “<script>alert(“ADIPTA”)</script> and then forward the intercept.
Now everything is done. Now after the page reloads after you join the newly named Wifi network, you will find that you will have a stored XSS as soon as you open General and then Basic Setup. The outcome will look like:
Reproduction steps are mentioned below:
-Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
-Go to –> “General Setup” –> “Wireless” –> “Basic Settings”
-Change the SSID to “Testing” and hit “Apply”
-Burp will capture the intercepts.
-Now change the SSID to <script>alert(“ADIPTA”)</script>
-Refresh the page, and you will get the “ADIPTA” pop-up
Highest Selling Technical Courses of Indian Cyber Security Solutions:
Cybersecurity services that can protect your company:
Other Location for Online Courses: