Cisco Small Business RV042 XSS

The RV042 is a Dual WAN, 4 port switch, VPN Router. Work just got it in to do a little load balancing and for fail over protection. One of my favorite things to do with new toys like this guy is give them a nice once over. Which of course is how i found a XSS in the login logging functions of this device. I was originally looking for weaknesses in the login scheme and notice that my attempts are being logged, notably the user name i was trying to login as was being logged, along with a brief description of the failure. I then put non-standard characters in there which broke the UI, after some more playing around i found i was able to get html to render, from there i just started messing with XSS payloads till i found one that worked.

Here is my working XSS at the login screen:
The string i used is < iframe src="https://dc414.org" >
For password i just put in some junk

Here is what it looks like after i submit:

Here is the XSS in action 🙂

K thats it, enjoy, peace.

This entry was posted in hacking, hardware, security, XSS. Bookmark the permalink.

3 Responses to Cisco Small Business RV042 XSS

  1. Jeremy says:

    Great find on the XSS vulnerability! I’m curious, though, if this RV042 is the same hardware as the older RV042s, because you seem to be running an aesthetically pleasing interface as opposed to the ugly old Linksys configuration. What firmware revision is yours running? I’m wondering if the firmware from yours would work with ours.

    Again, great work!

  2. AnarchyAngel says:

    Thanks, and I don’t know if its the same hardware as RV042s. The firmware I was using in this post was v4.0.0.07-tm

  3. Samir says:

    If you’re running v4.0.0.07-tm, you have the newest hardware version.

Leave a Reply

Your email address will not be published. Required fields are marked *