Skip to main content

CVE-2025-11134: Cross Site Scripting in Cudy TR1200

Medium
VulnerabilityCVE-2025-11134cvecve-2025-11134
Published: Mon Sep 29 2025 (09/29/2025, 01:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Cudy
Product: TR1200

Description

A security vulnerability has been detected in Cudy TR1200 1.16.3-20230804-164635. Impacted is an unknown function of the file /cgi-bin/luci/admin/network/wireless/config/ of the component Wireless Settings Page. Such manipulation of the argument SSID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/29/2025, 01:33:26 UTC

Technical Analysis

CVE-2025-11134 is a cross-site scripting (XSS) vulnerability identified in the Cudy TR1200 wireless router, specifically version 1.16.3-20230804-164635. The vulnerability resides in the Wireless Settings Page component, within the file /cgi-bin/luci/admin/network/wireless/config/. The issue arises from improper sanitization of the SSID parameter, which can be manipulated remotely by an attacker to inject malicious scripts. This vulnerability does not require authentication (as indicated by the CVSS vector AV:N and PR:H, but PR:H means high privileges, so authentication is required), but user interaction is needed (UI:P). The vendor was notified but has not responded or issued a patch. Although the CVSS score is moderate at 4.8, the exploit has been publicly disclosed, increasing the risk of exploitation. The vulnerability could allow attackers to execute arbitrary scripts in the context of the router's web interface, potentially leading to session hijacking, credential theft, or further network compromise. The lack of vendor response and patch availability heightens the urgency for affected users to implement mitigations.

Potential Impact

For European organizations using the Cudy TR1200 router, this vulnerability presents a moderate risk. Exploitation could lead to unauthorized access to router management interfaces, enabling attackers to alter network configurations, intercept traffic, or pivot to internal systems. This is particularly concerning for small and medium enterprises or home office setups relying on this router model, as they may lack advanced network defenses. The impact on confidentiality is moderate due to potential credential theft or session hijacking. Integrity could be compromised if attackers modify router settings. Availability impact is low as the vulnerability does not directly cause denial of service. Given the public disclosure and no vendor patch, attackers could weaponize this vulnerability to target European networks, especially in sectors with less stringent IT security controls. The requirement for user interaction (e.g., an administrator accessing the wireless settings page) somewhat limits exploitation but does not eliminate risk, especially in environments where multiple administrators or users access the router interface.

Mitigation Recommendations

Since no official patch is available, European organizations should take immediate steps to mitigate risk. First, restrict access to the router's web interface to trusted IP addresses or internal networks only, preventing remote access from untrusted sources. Disable remote management features if enabled. Enforce strong authentication policies for router access, including changing default credentials and using complex passwords. Monitor router logs for suspicious activity indicative of attempted XSS exploitation. Educate network administrators about the risk of interacting with manipulated SSID inputs and advise caution when configuring wireless settings. Consider deploying network segmentation to isolate the router management interface from critical systems. If possible, replace or upgrade to a router model with a vendor-supported firmware that addresses this vulnerability. Additionally, implement web application firewalls or intrusion detection systems that can detect and block XSS payloads targeting the router's interface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-28T09:42:16.529Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9de3249cfd472f57c87fc

Added to database: 9/29/2025, 1:17:38 AM

Last enriched: 9/29/2025, 1:33:26 AM

Last updated: 9/29/2025, 1:46:02 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats