A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
Metrics
Affected Vendors & Products
References
History
Thu, 03 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 03 Jul 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload. | |
| Title | Cross-site scripting via dst parameter in RouterOS WiFi hotspot | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Toreon
Published:
Updated: 2025-07-03T13:17:13.946Z
Reserved: 2025-06-24T07:00:12.112Z
Link: CVE-2025-6563
Updated: 2025-07-03T13:07:39.213Z
Status : Awaiting Analysis
Published: 2025-07-03T12:15:25.077
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-6563
No data.