Skip to content

ilostmypassword/Yinamakasi-PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Yinamakasi Exploit (Stored XSS)

Created by h3iko https://medium.com/@h3iko

Yinamakasi

Introduction

The Yinama microscope is a portable and wireless digital microscope made in China, equipped with a 2 MP camera and 8 adjustable LED lights. It is compatible with Android and iOS devices, as well as Windows and MacOS computers. It can operate using Wi-Fi or a cable, and to use it, you need to download an application (but we don't need it for this exploit).

This script exploits a Stored XSS vulnerability that I discovered in the manufacturer's configuration panel.

DISCLAIMER : This exploit works on Yinama microscopes, but as it is a white label product, it will probably works with other models that looks like this one.

Context

The configuration panel of the Yinama microscope is vulnerable to a Stored XSS attack, which can lead to the injection of malicious files into the configuration panel. These malicious files could then be downloaded by a victim. The affected parameter is the SSID parameter.

Installation

git clone https://github.com/ilostmypassword/Yinamakasi-Exploit.git
cd Yinamakasi-Exploit
pip3 install -r requirements.txt
chmod +x yinamakasi.py

Usage

  • The a.htm file can be modified as per your convenience; currently, it is the fake download page that I created, so you just need to change the IP adress at lines 48 to 54 to fit with your own (In hex or decimal).
  • If you use this page, make sure to add your malicious files (MaxSee.* according to the platform).
  • Connect to the Wi-Fi access point of the microscope.
  • python3 yinamakasi.py

Video PoC

Yinamakasi Exploit PoC

About

PoC for a Stored XSS found in a Yinama Microscope.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published