On Netis DL4323 devices, XSS exists via the urlFQDN parameter to form2url.cgi (aka the Keyword field of the URL Blocking Configuration).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://drive.google.com/open?id=1vIHv-UY0QLdnxDi-RW1hQHrdcuho0HRf | third party advisory exploit |
https://drive.google.com/open?id=1EtpCu6eZ0Hf2J70zg59wIlhUE8_bx1HE | third party advisory exploit |
https://fatihhcelik.blogspot.com/2019/12/xss-vulnerability-on-netis-dl4323.html | third party advisory exploit |