提交 #698650: Grandstream GXP1625 1.0.7.4 xss信息

标题Grandstream GXP1625 1.0.7.4 xss
描述Normal user update system variable to inject xss payload to network status info. It happens to the endpoint '/cgi-bin/api.values.post' can update system variable. Then normal user can call the endpoint to update vpn_ip, then the value will stored in the system. Every visit of network status can triggered the XSS vulnerability. One of the usage is to steal admin's cookie for further action. Report: https://drive.google.com/file/d/1rsskCaj4TwiaGG9_VYabjnKMP_zAry7L/view?usp=sharing pwd: YyF2mcRcCLR123MX24
来源⚠️ https://drive.google.com/file/d/1rsskCaj4TwiaGG9_VYabjnKMP_zAry7L/view?usp=sharing
用户
 cccll (UID 92824)
提交2025-11-20 15時11分 (5 月前)
管理2025-12-06 15時01分 (16 days later)
状态已接受
VulDB条目334606 [Grandstream GXP1625 1.0.7.4 Network Status Page /cgi-bin/api.values.post vpn_ip 跨网站脚本]
积分20

Might our Artificial Intelligence support you?

Check our Alexa App!