| 标题 | BDCOM P3310D Bios version 0.4.2 Firmware 10.1.0F Build 86345 Cross Site Scripting |
|---|
| 描述 | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router BDCOM-OLT
within the Remote Monitor feature (RMON Config → RMON History → New). The application does not properly sanitize input provided in the “Owner” parameter, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. Once submitted, the payload is stored and later executed when the RMON History page is accessed, as demonstrated by the triggered JavaScript prompt. This confirms that user-controlled input is being rendered without proper output encoding, exposing administrators to potential session hijacking, unauthorized actions, or further exploitation. Proper server-side validation and output encoding should be implemented to mitigate this vulnerability.
|
|---|
| 来源 | ⚠️ http://admin:admin@x.x.x.x:8082/ |
|---|
| 用户 | Havook (UID 71104) |
|---|
| 提交 | 2026-04-04 23時05分 (22 日前) |
|---|
| 管理 | 2026-04-24 21時58分 (20 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 359556 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New RMON History Page Owner 跨网站脚本] |
|---|
| 积分 | 17 |
|---|