| 标题 | BDCOM P3310D BIOS 0.4.2 10.1.0F Build 86345 Cross Site Scripting |
|---|
| 描述 | A stored Cross-Site Scripting (XSS) vulnerability was identified in the router interface.
within the Remote Monitor feature (RMON Config → RMON Statistics → New). The application fails to properly sanitize user input in the “Owner” parameter, allowing the injection of a malicious payload such as <img/src/onerror=prompt(8)>. This payload is stored by the application and executed when the RMON Statistics page is accessed, as evidenced by the triggered JavaScript prompt. This behavior confirms that input is not properly validated or encoded before being rendered, potentially enabling attackers to execute arbitrary scripts in the context of an authenticated administrator, leading to session hijacking or unauthorized actions. Implementing proper input validation and output encoding is recommended to mitigate this issue. |
|---|
| 来源 | ⚠️ http://admin:admin@x.x.x.x:8082/ |
|---|
| 用户 | Havook (UID 71104) |
|---|
| 提交 | 2026-04-04 23時14分 (22 日前) |
|---|
| 管理 | 2026-04-24 21時58分 (20 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 359557 [BDCOM P3310D 0.4.2 10.1.0F Build 86345 New RMON Statistics Page Owner 跨网站脚本] |
|---|
| 积分 | 17 |
|---|