CVE-2025-26064: n/a
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a connnected device.
AI Analysis
Technical Summary
CVE-2025-26064 is a cross-site scripting (XSS) vulnerability identified in Intelbras RX1500 version 2.2.9 and RX3000 version 1.0.11 devices. This vulnerability arises from insufficient input validation or sanitization of the 'name' field for connected devices within the device's web interface. An attacker can exploit this flaw by injecting crafted malicious scripts or HTML code into the device name parameter. When the vulnerable web interface processes or displays this injected content, it executes the attacker's arbitrary scripts in the context of the victim's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is client-side and requires the victim to access the affected device's web interface where the malicious payload is rendered. There is no indication that authentication is required to inject or trigger the payload, but typically, access to the device's management interface is needed. No public exploits are currently known, and no patches or updates have been linked yet. The lack of a CVSS score suggests this is a newly published vulnerability with limited public analysis. The vulnerability affects specific firmware versions of Intelbras network devices, which are commonly used in small to medium enterprise or residential network environments.
Potential Impact
For European organizations, this XSS vulnerability poses risks primarily to network security and user trust. If exploited, attackers could steal administrative credentials or session tokens, leading to unauthorized device configuration changes or network access. This could compromise network integrity and availability, especially if the devices serve as gateways or critical network infrastructure. The impact is heightened in environments where these devices are used to manage sensitive data or connect to internal networks. Additionally, exploitation could facilitate lateral movement within an organization's network or enable phishing attacks by injecting malicious content into the device's management interface. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed network devices means that targeted attacks could emerge. European organizations relying on Intelbras RX1500 or RX3000 devices should consider the risk of exposure, particularly in sectors such as telecommunications, small business networks, and critical infrastructure where these devices are deployed.
Mitigation Recommendations
Organizations should immediately inventory their network to identify Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 devices. Until a patch is available, restrict access to the device management interfaces to trusted networks and users only, ideally via VPN or secure management VLANs. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting device name fields. Disable or limit the ability to rename connected devices remotely if possible. Monitor device logs for unusual activity or repeated attempts to inject scripts. Educate administrators about the risk of XSS and encourage cautious handling of device names or any user-generated content displayed in management consoles. Regularly check Intelbras security advisories for patches or updates addressing this vulnerability and apply them promptly once released. Consider network segmentation to isolate vulnerable devices from critical systems to reduce potential lateral movement.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-26064: n/a
Description
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a connnected device.
AI-Powered Analysis
Technical Analysis
CVE-2025-26064 is a cross-site scripting (XSS) vulnerability identified in Intelbras RX1500 version 2.2.9 and RX3000 version 1.0.11 devices. This vulnerability arises from insufficient input validation or sanitization of the 'name' field for connected devices within the device's web interface. An attacker can exploit this flaw by injecting crafted malicious scripts or HTML code into the device name parameter. When the vulnerable web interface processes or displays this injected content, it executes the attacker's arbitrary scripts in the context of the victim's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is client-side and requires the victim to access the affected device's web interface where the malicious payload is rendered. There is no indication that authentication is required to inject or trigger the payload, but typically, access to the device's management interface is needed. No public exploits are currently known, and no patches or updates have been linked yet. The lack of a CVSS score suggests this is a newly published vulnerability with limited public analysis. The vulnerability affects specific firmware versions of Intelbras network devices, which are commonly used in small to medium enterprise or residential network environments.
Potential Impact
For European organizations, this XSS vulnerability poses risks primarily to network security and user trust. If exploited, attackers could steal administrative credentials or session tokens, leading to unauthorized device configuration changes or network access. This could compromise network integrity and availability, especially if the devices serve as gateways or critical network infrastructure. The impact is heightened in environments where these devices are used to manage sensitive data or connect to internal networks. Additionally, exploitation could facilitate lateral movement within an organization's network or enable phishing attacks by injecting malicious content into the device's management interface. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed network devices means that targeted attacks could emerge. European organizations relying on Intelbras RX1500 or RX3000 devices should consider the risk of exposure, particularly in sectors such as telecommunications, small business networks, and critical infrastructure where these devices are deployed.
Mitigation Recommendations
Organizations should immediately inventory their network to identify Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 devices. Until a patch is available, restrict access to the device management interfaces to trusted networks and users only, ideally via VPN or secure management VLANs. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting device name fields. Disable or limit the ability to rename connected devices remotely if possible. Monitor device logs for unusual activity or repeated attempts to inject scripts. Educate administrators about the risk of XSS and encourage cautious handling of device names or any user-generated content displayed in management consoles. Regularly check Intelbras security advisories for patches or updates addressing this vulnerability and apply them promptly once released. Consider network segmentation to isolate vulnerable devices from critical systems to reduce potential lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-07T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 688bbde8ad5a09ad00bba87d
Added to database: 7/31/2025, 7:03:04 PM
Last enriched: 7/31/2025, 7:17:47 PM
Last updated: 10/18/2025, 7:22:34 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.