CVE-2025-6563
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-03

Last updated on: 2025-07-03

Assigner: Toreon

Description
A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-03
Last Modified
2025-07-03
Generated
2026-05-07
AI Q&A
2025-07-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a cross-site scripting (XSS) issue in the hotspot feature of MikroTik's RouterOS versions below 7.19.2. An attacker can inject malicious JavaScript code via the 'dst' parameter. When a victim visits a crafted URL and logs in, the injected script executes. Additionally, the login POST request can be transformed into a GET request, allowing an attacker to create a URL that automatically logs the victim into the attacker's account and triggers the malicious script.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized script execution in the victim's browser, potentially allowing attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of the victim. Since the attacker can force automatic login into their account, it may also facilitate phishing or further exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart