Skip to content

Commit 7734507

Browse files
Update 2023-Starlink-Router-Gen2-XSS-ENG.md
1 parent 9d56c26 commit 7734507

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/blog/2023-Starlink-Router-Gen2-XSS-ENG.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ This Request's header contains several important pieces of information.
121121

122122
Dishy Stow Request body (protobuf encoded)
123123

124-
```html
124+
```
125125
\x00\x00\x00\x00\x03\x92\x7d\x00
126126
```
127127

@@ -177,7 +177,7 @@ For example, by chaining a bug in `192.168.100.1` and `Cross-Site Scripting (XSS
177177

178178
Therefore, by chaining the `Cross-Site Scripting (XSS)` vulnerability and the aforementioned `bug`, a payload that sends a `Stow gRPC` request to `Dishy` can be constructed as follows: (The result is that an attacker can remotely take control of the `router` or `Dishy`. For example, they could send `gRPC` commands to change `router settings` or manipulate `Dishy's functionality`.)
179179

180-
```html
180+
```
181181
<html>
182182
<body>
183183
<h1>Dishy Stow and Unstow</h1>

0 commit comments

Comments
 (0)