提交 #797249: BDCOM P3310D BIOS 0.4.2 10.1.0F Build 86345 Cross Site Scripting信息

标题BDCOM P3310D BIOS 0.4.2 10.1.0F Build 86345 Cross Site Scripting
描述A stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface. within the Remote Monitor feature (RMON Config → RMON Statistics → New). The application fails to properly sanitize user input in the “Owner” parameter, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. This payload is stored by the application and executed when the RMON Statistics page is accessed, as evidenced by the triggered JavaScript prompt. This behavior confirms that input is not properly validated or encoded before being rendered, potentially enabling attackers to execute arbitrary scripts in the context of an authenticated administrator, leading to session hijacking or unauthorized actions. Implementing proper input validation and output encoding is recommended to mitigate this issue.
来源⚠️ http://admin:admin@x.x.x.x:8082/
用户
 Havook (UID 71104)
提交2026-04-04 23時14分 (22 日前)
管理2026-04-24 21時58分 (20 days later)
状态已接受
VulDB条目359557 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New RMON Statistics Page Owner 跨网站脚本]
积分17

Do you want to use VulDB in your project?

Use the official API to access entries easily!