### [CVE-2015-1028](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1028) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2730B router (rev C1) with firmware GE_1.01 allow remote authenticated users to inject arbitrary web script or HTML via the (1) domainname parameter to dnsProxy.cmd (DNS Proxy Configuration Panel); the (2) brName parameter to lancfg2get.cgi (Lan Configuration Panel); the (3) wlAuthMode, (4) wl_wsc_reg, or (5) wl_wsc_mode parameter to wlsecrefresh.wl (Wireless Security Panel); or the (6) wlWpaPsk parameter to wlsecurity.wl (Wireless Password Viewer). ### POC #### Reference - http://www.exploit-db.com/exploits/35747 - http://www.exploit-db.com/exploits/35750 - http://www.exploit-db.com/exploits/35751 - http://www.xlabs.com.br/blog/?p=339 #### Github - https://github.com/ARPSyndicate/cvemon