There is XSS in the BouquetEditor WebPlugin for Dream Multimedia Dreambox devices, as demonstrated by the "Name des Bouquets" field, or the file parameter to the /file URI.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42986/ | third party advisory vdb entry exploit |
https://fireshellsecurity.team/assets/pdf/Vulnerability-XSS-Dreambox.pdf | third party advisory exploit |