CVE-2017

View on GitHub

CVE-2017-14250

Firmware Version: 3.11.7 Build 100603 Rel.56412n

Hardware Version: WR741N v1/v2 00000000

WEB Console Interface-Wireless Settings and Status Section:

The value of the SSID field is not validated correctly. The user input will populate the javascript ###wlanPara variable in clear as written.

1

payload:</script><H1>BUG

It is possible to close the script tag and inject HTML code, which persists on the router’s memory as an integral part of the code, and will cause unexpected behavior in the administration console.

2

payload:</script><H1>BUG<!--	

part of the body code is commented through the injection of the <! – in order to further compromise the view of the page.

3

4

Wireless Settings section view

payload:</script><a href=”XX”><!--

The changement of the Wireless Settings page and the Status page becomes unusable because each click will be redirected to an error page. To restore the router normal behaviour, will need a factory reset.

6

7

8

see the XX address injected to the bottom left.

9

WEB Console Interface-Wireless MAC Filtering Section:

payload:<img src=x onerror=alert(1)>	

Within the Wireless MAC Filtering section, you can inject javascript code within the Description field of a MAC Address Filtering entry.

9

The injected and persistent code will be executed for each viewing by any user who will access the Wireless MAC Filtering page.

10

11

Reference

link CVE