Submit #797896: D-Link DSL-2740R EU_01.15 Cross Site Scriptinginfo

TitleD-Link DSL-2740R EU_01.15 Cross Site Scripting
DescriptionA stored Cross-Site Scripting (XSS) vulnerability was identified in the wireless configuration functionality of the router. By navigating to the Wireless Setup section and modifying the “Wireless Network Name (SSID)” field with a malicious payload such as "><img/src/onerror=prompt(8)>, the application fails to properly sanitize user input. The injected payload is then stored and later reflected in the Status page, where it is executed in the context of the user’s browser, as demonstrated by the triggered JavaScript prompt. This confirms that both input validation and output encoding are insufficient, allowing attackers to execute arbitrary scripts, potentially leading to session hijacking or unauthorized actions within the administrative interface. Implementing proper server-side validation and context-aware output encoding is recommended to mitigate this vulnerability.
Source⚠️ http://admin:admin@x.x.x.x/
User
 Havook (UID 71104)
Submission04/06/2026 17:11 (21 days ago)
Moderation04/25/2026 16:15 (19 days later)
StatusAccepted
VulDB entry359607 [D-Link DSL-2740R EU_01.15 Wireless Setup Section Wireless Network Name cross site scripting]
Points17

Might our Artificial Intelligence support you?

Check our Alexa App!