NETGEAR JNR1010 devices before 1.0.0.32 allow webproc?getpage= XSS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://lists.openwall.net/full-disclosure/2016/01/11/1 | mailing list exploit |
https://github.com/cybersecurityworks/Disclosed/issues/12 | third party advisory exploit |
https://packetstormsecurity.com/files/135194/Netgear-1.0.0.24-Cross-Site-Scripting.html | exploit vdb entry third party advisory |
http://007software.net/multiple-cross-site-scripting-in-netgear-router-version1-0-0-24/ | third party advisory |
https://khalil-shreateh.com/khalil.shtml/it-highlights/592-Netgear-1.0.0.24-Cross-Site-Request-Forgery--.html | third party advisory exploit |
https://cybersecurityworks.com/zerodays/cve-2016-11016-netgear.html | third party advisory exploit |