javascript – XSS in a variable assignment when ” are escaped


user input is reflected inside a variable.
For example

is reflected as shown below

var test="hello";

I tried to evade from the variable with payload like hello"; or hello%22; or hello%2522; but unsuccessfully.
All these characters are reflected without encoding: .[]{};:{}/?|_-+ so i can use them

Is there another way to exploit this situation?