Vendor:D-Link
Product: DIR-615
Version: 20.07
Hardware Version: T1
Vendor Homepage: http://us.dlink.com/
CVE: CVE-2018-15874
NVD: CVE-2018-15874
Verification Steps:
- In the xss_dhcp.py script set the 'interface' and 'mac' variable.
- Set 'interface' to the network adapter's name
- Set 'mac' to the network adapter's mac address
- Set the 'hostname' variable in the dhcp_request function to some arbitrary javascript
- e.g.
<script>alert('xss')</script>
- Set the 'siaddr' variable in the dhcp_request function to the D-Link router's local IP address
- Connect to the router which is undergoing the test
- Run the python script with administrator privileges
- Navigate to the Status->ActiveClientTable tab in the router admin page to verify that the javascript was uploaded