ID

VAR-E-202208-0063


TITLE

Fiberhome AN5506-02-B Cross Site Scripting

Trust: 0.5

sources: PACKETSTORM: 168065

DESCRIPTION

Fiberhome AN5506-02-B with firmware version RP2521 suffers from a persistent cross site scripting vulnerability.

Trust: 0.5

sources: PACKETSTORM: 168065

AFFECTED PRODUCTS

vendor:fiberhomemodel:an5506-02-bscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 168065

EXPLOIT

# Exploit Title: FiberHome - AN5506-02-B - RP2521 - Authenticated Stored XSS
# Date: 10/08/2022
# Exploit Author: Leonardo Goncalves
# Version: Firmware RP2521

1) Log in the equipment via your web browser
2) Go to Network > auth_settings
3) In the "sncfg_loid" inject the payload "<script>alert()</script>"
4) Click Save
5) Exploit!

Trust: 0.5

sources: PACKETSTORM: 168065

EXPLOIT HASH

LOCAL

SOURCE

md5: 743eba9b7b1792788f51a3699e8cae2f
sha-1: ca1ad76ec7806cf20821ebdfaf25c6313f171403
sha-256: 6468873259d857e4b7cda7bf2ece5a2b2508ecd08b9330bef4207248417b9146
sha-256: 6468873259d857e4b7cda7bf2ece5a2b2508ecd08b9330bef4207248417b9146

Trust: 0.5

sources: PACKETSTORM: 168065

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 168065

TYPE

xss

Trust: 0.5

sources: PACKETSTORM: 168065

TAGS

tag:exploit

Trust: 0.5

tag:xss

Trust: 0.5

sources: PACKETSTORM: 168065

CREDITS

Leonardo Goncalves

Trust: 0.5

sources: PACKETSTORM: 168065

EXTERNAL IDS

db:PACKETSTORMid:168065

Trust: 0.5

sources: PACKETSTORM: 168065

SOURCES

db:PACKETSTORMid:168065

LAST UPDATE DATE

2022-11-23T14:45:32.706000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:168065date:2022-08-11T15:45:20