Skip to content

Commit 6bd0b2d

Browse files
Update 2023-Starlink-Router-Gen2-XSS-KOR.md
1 parent ae29293 commit 6bd0b2d

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/blog/2023-Starlink-Router-Gen2-XSS-KOR.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ tags: ["SpaceX", "Starlink", "Router", "Dishy" ,"Exploit", "Hacking", "CVE-2023-
4646

4747
해당 `Cross-Site Scripting (XSS)` 취약점은 위의 PoC(Proof of Concept)처럼 `Cross-Site Request Forgery (CSRF)` 공격과 함께 활용될 수 있습니다.
4848

49-
[reproduce(PoC).mov](/blog/2023-Starlink-Router-Gen2-XSS/reproduce(PoC).mov)
49+
[Proof-of-Concept.mov](/blog/2023-Starlink-Router-Gen2-XSS/reproduce(PoC).mov)
5050

5151
# **Exploit**
5252

@@ -64,7 +64,7 @@ tags: ["SpaceX", "Starlink", "Router", "Dishy" ,"Exploit", "Hacking", "CVE-2023-
6464

6565
(원래는 `Dishy`의 내부 주소인 192.168.100.1에서는 `captive portal` 페이지에 접근할 수 없어야 합니다.)
6666

67-
[192.168.100.1_PoC.mov](/blog/2023-Starlink-Router-Gen2-XSS/192.168.100.1_PoC.mov)
67+
[192.168.100.1_Proof-of-Concept.mov](/blog/2023-Starlink-Router-Gen2-XSS/192.168.100.1_PoC.mov)
6868

6969
[http://192.168.100.1/setup](http://192.168.100.1/setup) 주소에서도 똑같이 `Cross-Site Scripting (XSS)` 취약점이 발생하는 것을 확인할 수 있습니다.
7070

@@ -197,7 +197,7 @@ Dishy Stow Request body (protobuf encoded)
197197

198198
---
199199

200-
[Exploit-PoC.mp4](/blog/2023-Starlink-Router-Gen2-XSS/Exploit-PoC.mp4)
200+
[Exploit-Demo.mp4](/blog/2023-Starlink-Router-Gen2-XSS/Exploit-PoC.mp4)
201201

202202
# CVE
203203

0 commit comments

Comments
 (0)