Multiple cross-site scripting (XSS) vulnerabilities in D-Link DIR-645 Router (Rev. A1) with firmware before 1.04B11 allow remote attackers to inject arbitrary web script or HTML via the (1) deviceid parameter to parentalcontrols/bind.php, (2) RESULT parameter to info.php, or (3) receiver parameter to bsc_sms_send.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt | exploit |
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008 | patch vendor advisory |
http://osvdb.org/show/osvdb/95953 | vdb entry |
http://osvdb.org/show/osvdb/95952 | vdb entry |
http://osvdb.org/show/osvdb/95910 | vdb entry |
http://www.securityfocus.com/bid/61579 | vdb entry |