Enviar #797896: D-Link DSL-2740R EU_01.15 Cross Site Scriptinginformación

TítuloD-Link DSL-2740R EU_01.15 Cross Site Scripting
DescripciónA stored Cross-Site Scripting (XSS) vulnerability was identified in the wireless configuration functionality of the router. By navigating to the Wireless Setup section and modifying the “Wireless Network Name (SSID)” field with a malicious payload such as "><img/src/onerror=prompt(8)>, the application fails to properly sanitize user input. The injected payload is then stored and later reflected in the Status page, where it is executed in the context of the user’s browser, as demonstrated by the triggered JavaScript prompt. This confirms that both input validation and output encoding are insufficient, allowing attackers to execute arbitrary scripts, potentially leading to session hijacking or unauthorized actions within the administrative interface. Implementing proper server-side validation and context-aware output encoding is recommended to mitigate this vulnerability.
Fuente⚠️ http://admin:admin@x.x.x.x/
Usuario
 Havook (UID 71104)
Sumisión2026-04-06 17:11 (hace 22 días)
Moderación2026-04-25 16:15 (19 days later)
EstadoAceptado
Entrada de VulDB359607 [D-Link DSL-2740R EU_01.15 Wireless Setup Section Wireless Network Name secuencias de comandos en sitios cruzados]
Puntos17

Interested in the pricing of exploits?

See the underground prices here!