Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15895 PoC — D-Link DIR-816L 跨站脚本漏洞

Source
Associated Vulnerability
Title:D-Link DIR-816L 跨站脚本漏洞 (CVE-2020-15895)
Description:D-Link DIR-816L是中国台湾友讯(D-Link)公司的一款无线路由器。 D-Link DIR-816L 1.10b04Beta02之前的2.x版本中的webinc/js/info.php文件存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
D-Link DIR-816L devices 2.x before 1.10b04Beta02 contains a cross-site scripting vulnerability. In the file webinc/js/info.php, no output filtration is applied to the RESULT parameter before being printed on the webpage. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site, which can allow for theft of cookie-based authentication credentials and launch of other attacks.
File Snapshot

id: CVE-2020-15895 info: name: D-Link DIR-816L 2.x - Cross-Site Scripting author: edoardottt ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.