CVE-2025-14186
BaseFortify
Publication date: 2025-12-07
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| grandstream | gxp1625 | 1.0.7.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-80 | The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a basic cross-site scripting (XSS) flaw found in the Grandstream GXP1625 version 1.0.7.4, specifically in an unknown function within the /cgi-bin/api.values.post file of the Network Status Page component. By manipulating the vpn_ip argument, an attacker can perform remote exploitation of this XSS vulnerability.
How can this vulnerability impact me? :
The vulnerability allows an attacker to perform cross-site scripting attacks remotely, which can lead to the injection of malicious scripts into the affected device's web interface. This can result in unauthorized actions performed on behalf of the user, potential session hijacking, or other malicious activities that compromise the integrity of the device's network status page.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the /cgi-bin/api.values.post endpoint on the Grandstream GXP1625 device for improper sanitization of the vpn_ip argument. You can attempt to send specially crafted requests that include script tags or special characters such as <, >, and & in the vpn_ip parameter and observe if the payload is executed or reflected in the Network Status Page. For example, using curl to POST a payload: curl -X POST -d "vpn_ip=<script>alert(1)</script>" http://<device-ip>/cgi-bin/api.values.post and then accessing the Network Status Page to check if the script executes. Detection involves verifying if the input is improperly neutralized and leads to cross-site scripting. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include discontinuing use of the affected Grandstream GXP1625 firmware version 1.0.7.4 if possible, as no vendor patch or countermeasures are available. Restrict access to the /cgi-bin/api.values.post endpoint to trusted users only, implement network-level filtering or firewall rules to limit exposure, and monitor for suspicious activity. Replacement of the affected product is suggested since no known fixes exist. Additionally, educate users to avoid interacting with suspicious links that could exploit this XSS vulnerability. [1]