| عنوان | BDCOM P3310D Bios version 0.4.2 Firmware 10.1.0F Build 86345 Cross Site Scripting |
|---|
| الوصف | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router BDCOM-OLT
within the Remote Monitor feature (RMON Config → RMON History → New). The application does not properly sanitize input provided in the “Owner” parameter, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and later executed when the RMON History page is accessed, as demonstrated by the triggered JavaScript prompt. This confirms that user-controlled input is being rendered without proper output encoding, exposing administrators to potential session hijacking, unauthorized actions, or further exploitation. Proper server-side validation and output encoding should be implemented to mitigate this vulnerability.
|
|---|
| المصدر | ⚠️ http://admin:admin@x.x.x.x:8082/ |
|---|
| المستخدم | Havook (UID 71104) |
|---|
| ارسال | 04/04/2026 11:05 PM (22 أيام منذ) |
|---|
| الاعتدال | 24/04/2026 09:58 PM (20 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 359556 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New RMON History Page Owner البرمجة عبر المواقع] |
|---|
| النقاط | 17 |
|---|