On Netis DL4323 devices, XSS exists via the form2Ddns.cgi username parameter (DynDns settings of the Dynamic DNS Configuration).
                
            References
                    | Link | Resource | 
|---|---|
| https://drive.google.com/open?id=1HrYqVKlSxhQqB5tNhhLIgpyfi0Y2ZL80 | Exploit Third Party Advisory | 
| https://drive.google.com/open?id=1i5gIrJRy5L7lTIsYZp9GsvR8ZGCWtnMj | Exploit Third Party Advisory | 
| https://fatihhcelik.blogspot.com/2019/12/stored-xss-on-username-input-2-netis.html | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2019-12-30 00:15
Updated : 2020-01-02 20:12
NVD link : CVE-2019-20076
Mitre link : CVE-2019-20076
CVE.ORG link : CVE-2019-20076
JSON object : View
Products Affected
                netis-systems
- dl4343
 - dl4343_firmware
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
