ID

VAR-E-201612-0289


TITLE

Netgear R7000 - Cross-Site Scripting Vulnerability

Trust: 0.6

sources: EDBNET: 89602

AFFECTED PRODUCTS

vendor:netgearmodel:r7000scope: - version: -

Trust: 0.6

sources: EDBNET: 89602

EXPLOIT

# Exploit Title: Netgear R7000 - XSS via. DHCP hostname
# Date: 11-12-2016
# Exploit Author: Vincent Yiu
# Contact: https://twitter.com/vysecurity
# Vendor Homepage: https://www.netgear.com/
# Category: Hardware / WebApp
# Version: V1.0.7.2_1.1.93 + LATEST to date
-Vulnerability
An user who has access to send DHCP via either VPN or Wireless connection can serve a host name with script tags to trigger XSS.
Could be potentially used to connect to open or guest WIFI hotspot and inject stored XSS into admin panel and steal cookie for authentication.
http://RouterIP/start.htm
Then visit the "view who's connected" page.
-Proof Of Concept
Set /etc/dhcp/dhclient.conf
send host-name "<script>alert('xss')</script>";

Trust: 0.6

sources: EDBNET: 89602

PRICE

free

Trust: 0.6

sources: EDBNET: 89602

TYPE

Cross-Site Scripting Vulnerability

Trust: 0.6

sources: EDBNET: 89602

EXTERNAL IDS

db:0DAYTODAYid:26505

Trust: 0.6

db:EDBNETid:89602

Trust: 0.6

sources: EDBNET: 89602

REFERENCES

url:https://0day.today/exploits/26505

Trust: 0.6

sources: EDBNET: 89602

SOURCES

db:EDBNETid:89602

LAST UPDATE DATE

2022-07-27T09:18:29.559000+00:00


SOURCES RELEASE DATE

db:EDBNETid:89602date:2016-12-17T00:00:00