CVE-2025-26064: n/a
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a connnected device.
AI Analysis
Technical Summary
CVE-2025-26064 is a cross-site scripting (XSS) vulnerability identified in Intelbras RX1500 version 2.2.9 and RX3000 version 1.0.11 devices. This vulnerability arises from insufficient input validation or sanitization of the 'name' field for connected devices within the device's web interface. An attacker can exploit this flaw by injecting crafted malicious scripts or HTML code into the device name parameter. When the vulnerable web interface processes or displays this injected content, it executes the attacker's arbitrary scripts in the context of the victim's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is client-side and requires the victim to access the affected device's web interface where the malicious payload is rendered. There is no indication that authentication is required to inject or trigger the payload, but typically, access to the device's management interface is needed. No public exploits are currently known, and no patches or updates have been linked yet. The lack of a CVSS score suggests this is a newly published vulnerability with limited public analysis. The vulnerability affects specific firmware versions of Intelbras network devices, which are commonly used in small to medium enterprise or residential network environments.
Potential Impact
For European organizations, this XSS vulnerability poses risks primarily to network security and user trust. If exploited, attackers could steal administrative credentials or session tokens, leading to unauthorized device configuration changes or network access. This could compromise network integrity and availability, especially if the devices serve as gateways or critical network infrastructure. The impact is heightened in environments where these devices are used to manage sensitive data or connect to internal networks. Additionally, exploitation could facilitate lateral movement within an organization's network or enable phishing attacks by injecting malicious content into the device's management interface. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed network devices means that targeted attacks could emerge. European organizations relying on Intelbras RX1500 or RX3000 devices should consider the risk of exposure, particularly in sectors such as telecommunications, small business networks, and critical infrastructure where these devices are deployed.
Mitigation Recommendations
Organizations should immediately inventory their network to identify Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 devices. Until a patch is available, restrict access to the device management interfaces to trusted networks and users only, ideally via VPN or secure management VLANs. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting device name fields. Disable or limit the ability to rename connected devices remotely if possible. Monitor device logs for unusual activity or repeated attempts to inject scripts. Educate administrators about the risk of XSS and encourage cautious handling of device names or any user-generated content displayed in management consoles. Regularly check Intelbras security advisories for patches or updates addressing this vulnerability and apply them promptly once released. Consider network segmentation to isolate vulnerable devices from critical systems to reduce potential lateral movement.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-26064: n/a
Description
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a connnected device.
AI-Powered Analysis
Technical Analysis
CVE-2025-26064 is a cross-site scripting (XSS) vulnerability identified in Intelbras RX1500 version 2.2.9 and RX3000 version 1.0.11 devices. This vulnerability arises from insufficient input validation or sanitization of the 'name' field for connected devices within the device's web interface. An attacker can exploit this flaw by injecting crafted malicious scripts or HTML code into the device name parameter. When the vulnerable web interface processes or displays this injected content, it executes the attacker's arbitrary scripts in the context of the victim's browser session. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is client-side and requires the victim to access the affected device's web interface where the malicious payload is rendered. There is no indication that authentication is required to inject or trigger the payload, but typically, access to the device's management interface is needed. No public exploits are currently known, and no patches or updates have been linked yet. The lack of a CVSS score suggests this is a newly published vulnerability with limited public analysis. The vulnerability affects specific firmware versions of Intelbras network devices, which are commonly used in small to medium enterprise or residential network environments.
Potential Impact
For European organizations, this XSS vulnerability poses risks primarily to network security and user trust. If exploited, attackers could steal administrative credentials or session tokens, leading to unauthorized device configuration changes or network access. This could compromise network integrity and availability, especially if the devices serve as gateways or critical network infrastructure. The impact is heightened in environments where these devices are used to manage sensitive data or connect to internal networks. Additionally, exploitation could facilitate lateral movement within an organization's network or enable phishing attacks by injecting malicious content into the device's management interface. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed network devices means that targeted attacks could emerge. European organizations relying on Intelbras RX1500 or RX3000 devices should consider the risk of exposure, particularly in sectors such as telecommunications, small business networks, and critical infrastructure where these devices are deployed.
Mitigation Recommendations
Organizations should immediately inventory their network to identify Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 devices. Until a patch is available, restrict access to the device management interfaces to trusted networks and users only, ideally via VPN or secure management VLANs. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting device name fields. Disable or limit the ability to rename connected devices remotely if possible. Monitor device logs for unusual activity or repeated attempts to inject scripts. Educate administrators about the risk of XSS and encourage cautious handling of device names or any user-generated content displayed in management consoles. Regularly check Intelbras security advisories for patches or updates addressing this vulnerability and apply them promptly once released. Consider network segmentation to isolate vulnerable devices from critical systems to reduce potential lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-07T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 688bbde8ad5a09ad00bba87d
Added to database: 7/31/2025, 7:03:04 PM
Last enriched: 7/31/2025, 7:17:47 PM
Last updated: 8/26/2025, 12:13:30 AM
Views: 29
Related Threats
CVE-2025-34165: CWE-121 Stack-based Buffer Overflow in NetSupport Ltd. NetSupport Manager
HighCVE-2025-34164: CWE-122 Heap-based Buffer Overflow in NetSupport Ltd. NetSupport Manager
HighNew zero-click exploit allegedly used to hack WhatsApp users
HighResearchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution
HighCVE-2025-58159: CWE-434: Unrestricted Upload of File with Dangerous Type in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.