Main

related bits

0

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Events

first seen date

2024-01-18 02:17:24

expired found date

-

created at

2024-06-10 03:28:29

updated at

2026-01-17 01:26:14

Domain name statistics

length

23

crc

4867

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

13642151 (wordpress.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

174643

mp size raw text

63032

mp inner links count

20

mp inner links status

20 (imported)

Open Graph

title

m0nad's Blog

description

Just another WordPress.com site

image

site name

m0nad's Blog

author

updated

2025-12-22 09:20:04

raw text

m0nad's Blog | Just another WordPress.com site m0nad's Blog Just another WordPress.com site Persistent XSS and CSRF in TG862A Arris Modem leave a comment » Continue with the bugs founded by me on the Arris Modem Series, the TG862A(TS0705125D_031115_MODEL_862_GW) Arris Modem have some obvious persistent XSS and CSRF bugs , in the ‘Firewall’ area. In the  Firewall->Virtual Servers section We can add a new ‘Virtual Server’ And put the malicious Javascript code on the “Description” field After click on the button for add a new virtual server, this make the requests to create a new virtual server and when the “virtual server” page with malicious Javascript is called, shows the alert pop-up The application don’t have any kind of protection to prevent CSRF attacks and the code used for PoC is below. 😉 function submitRequest() { var xhr = new XMLHttpRequest(); xhr.open("GET", "http://192.168.0.1/snmpGet?oids=1.3.6.1.4.1.4115.1.20.1.1....

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

126 (language undetectable (empty document, too short, or engines disagree))

category id

Serwisy SEC (10)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

40344

text words

9292

text unique words

1647

text lines

1468

text sentences

190

text paragraphs

112

text words per sentence

48

text matched phrases

17

text matched dictionaries

5

RSS

rss status

12 (RSS import suspended due to XML file errors)

rss found date

2024-01-22 19:41:37

rss size orig

98201

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

40 (completed successful import of reports.txt file to table in_pages)

sitemap review version

2

sitemap urls count

32

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2024-01-22 05:34:07

sitemap process date

2025-09-03 00:06:15

sitemap first import date

-

sitemap last import date

2026-01-17 01:26:14