ID

VAR-201005-0435


TITLE

D-Link DI-724P+ Router 'wlap.htm' HTML Injection Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2010-0907 // BID: 40261

DESCRIPTION

The D-Link DI-724P+ is a wireless router device. In the device management WEB interface, under the \"wireless\" tab, the script can be injected from the GET string. By injecting arbitrary HTML and malicious script code, it can be executed on the target user's browser. The affected URL is: http://192.168.0.1/wlap.htm. D-Link DI-724P+ router is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting this issue may allow an attacker to execute HTML and script code in the context of the device, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible

Trust: 0.81

sources: CNVD: CNVD-2010-0907 // BID: 40261

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-0907

AFFECTED PRODUCTS

vendor:d linkmodel:di-724p+ di-724p+scope: - version: -

Trust: 0.6

vendor:d linkmodel:di-724p+scope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2010-0907 // BID: 40261

THREAT TYPE

network

Trust: 0.3

sources: BID: 40261

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 40261

EXTERNAL IDS

db:BIDid:40261

Trust: 0.9

db:CNVDid:CNVD-2010-0907

Trust: 0.6

sources: CNVD: CNVD-2010-0907 // BID: 40261

REFERENCES

url:http://seclists.org/fulldisclosure/2010/may/262

Trust: 0.9

url:http://www.dlink.com/

Trust: 0.3

sources: CNVD: CNVD-2010-0907 // BID: 40261

CREDITS

w01f

Trust: 0.3

sources: BID: 40261

SOURCES

db:CNVDid:CNVD-2010-0907
db:BIDid:40261

LAST UPDATE DATE

2022-05-17T02:09:17.960000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-0907date:2010-05-20T00:00:00
db:BIDid:40261date:2010-05-19T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-0907date:2010-05-20T00:00:00
db:BIDid:40261date:2010-05-19T00:00:00