Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-35262 PoC — Digisol Systems DG-HR3400 跨站脚本漏洞

Source
Associated Vulnerability
Title:Digisol Systems DG-HR3400 跨站脚本漏洞 (CVE-2020-35262)
Description:Digisol Systems DG-HR3400是印度Digisol Systems公司的一款无线路由器。 Digisol DG-HR3400 存在跨站脚本漏洞,该漏洞源于系统时间中的NTP服务器名和URL过滤器中的“关键字”。
Description
Cross Site Scripting (XSS) in Digisol DG-HR3400 Router
Readme
# CVE-2020-35262: Stored XSS in Digisol DG-HR3400 Router

## **[Vulnerability Description]()**

It has been identified that the vulnerable endpoint doesn't have server side input validation and lacks client side filtering for any malicious script injection. An attacker can use this vulnerability to inject malicious script in the endpoint and the script is activated every time a user opens the vulnerable endpoint. Attackers can perform malicious operations using this vulnerability to take over the device and finally, to take over the network.

**Researcher:** Sayli Ambure (https://twitter.com/sayli_ambure)  

**MITRE CVE link:** https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35262

## **[Proof-of-Concept Exploit:]()**

### **[1. NTP configuration in Maintenance module]()**

**Parameter: Server**

### **[Proof of Concept Video:]()**

<a href="http://www.youtube.com/watch?feature=player_embedded&v=E5wEzf-gkOE
" target="_blank"><img src="http://img.youtube.com/vi/E5wEzf-gkOE/0.jpg" 
 width="500" height="300" border="10" /></a>
 
 ### **[2. URL Blocking configuration in Advanced module]()**
 
 **Parameter: Keyword**
 
 ### **[Proof of Concept video:]()**
 
<a href="http://www.youtube.com/watch?feature=player_embedded&v=VJVjuLYbgcQ
" target="_blank"><img src="http://img.youtube.com/vi/VJVjuLYbgcQ/0.jpg" 
 width="500" height="300" border="10" /></a>
File Snapshot

[4.0K] /data/pocs/b2c5727ac7d3d7798a3571705953ca9ccc47f8fd └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.