Home

Description

A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.

PUBLISHED Reserved 2025-06-24 | Published 2025-07-03 | Updated 2025-07-03 | Assigner Toreon




MEDIUM: 4.8CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

Any version before 7.19.2
affected

References

www.toreon.com/...-ski-trip-led-to-a-cve-in-a-wi-fi-hotspot/ exploit

www.toreon.com/...-ski-trip-led-to-a-cve-in-a-wi-fi-hotspot/

cve.org (CVE-2025-6563)

nvd.nist.gov (CVE-2025-6563)

Download JSON