Submit #656886: Cudy TR1200 1.0 Cross Site Scriptinginfo

TitelCudy TR1200 1.0 Cross Site Scripting
BeschreibungCudy AC1200 1.0 Cross Site Scripting Device Information Device: Cudy TR1200 (HW Ver 1.0) Firmware Version: 1.16.3-20230804-164635 Product Page: https://www.cudy.com/en-us/products/tr1200-1-0 Vendor Contact: [email protected] Vulnerability Summary A stored Cross-Site Scripting (XSS) vulnerability was identified in the administration web interface of the Cudy TR1200 router. The issue affects the SSID fields of both 2.4 GHz and 5 GHz wireless settings. Malicious JavaScript can be injected and executed in the context of the authenticated administrator. Affected Endpoints Endpoint: /cgi-bin/luci/admin/network/wireless/config/ Parameters: - cbi.dce.wireless.vlan10.ssid (2.4 GHz SSID) - cbi.dce.wireless.vlan1.ssid (5 GHz SSID) Proof of Concept 1. Log into the router's web administration panel. 2. Navigate to General Settings → Wireless. 3. Set SSID field to the following payload: "><script>alert(5)</script> 4. Click Save & Apply. 5. The injected JavaScript executes whenever the administrator revisits or updates these or any other settings. Impact This vulnerability enables arbitrary JavaScript execution in the context of an authenticated admin. Potential impacts include session hijacking, CSRF bypass, and execution of administrative actions under the victim's privileges. Since the payload is stored, it can persist across sessions and affect other administrators.
Quelle⚠️ https://github.com/blackcloud411/Cudy_vuln/blob/main/CUDY_TR1200_XSS_Report.docx
Benutzer
 80_ate (UID 89778)
Einreichung17.09.2025 05:37 (vor 7 Monaten)
Moderieren28.09.2025 11:42 (11 days later)
StatusAkzeptiert
VulDB Eintrag326211 [Cudy TR1200 1.16.3-20230804-164635 Wireless Settings Page config SSID Cross Site Scripting]
Punkte20