| タイトル | BDCOM P3310D Bios version 0.4.2 Firmware 10.1.0F Build 86345 Cross Site Scripting |
|---|
| 説明 | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router BDCOM-OLT
within the Remote Monitor feature (RMON Config → RMON History → New). The application does not properly sanitize input provided in the “Owner” parameter, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and later executed when the RMON History page is accessed, as demonstrated by the triggered JavaScript prompt. This confirms that user-controlled input is being rendered without proper output encoding, exposing administrators to potential session hijacking, unauthorized actions, or further exploitation. Proper server-side validation and output encoding should be implemented to mitigate this vulnerability.
|
|---|
| ソース | ⚠️ http://admin:admin@x.x.x.x:8082/ |
|---|
| ユーザー | Havook (UID 71104) |
|---|
| 送信 | 2026年04月04日 23:05 (22 日 ago) |
|---|
| モデレーション | 2026年04月24日 21:58 (20 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 359556 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New RMON History Page Owner クロスサイトスクリプティング] |
|---|
| ポイント | 17 |
|---|