CVE-2025-65289: n/a
A stored Cross site scripting (XSS) vulnerability in the Mercury MR816v2 (081C3114 4.8.7 Build 110427 Rel 36550n) router allows a remote attacker on the LAN to inject JavaScript into the router's management UI by submitting a malicious hostname. The injected script is stored and later executed in the context of an administrator's browser (for example after DHCP release/renew triggers the interface to display the stored hostname). Because the management interface uses weak/basic authentication and does not properly protect or isolate session material, the XSS can be used to exfiltrate the admin session and perform administrative actions.
AI Analysis
Technical Summary
CVE-2025-65289 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Mercury MR816v2 router's management interface (firmware version 4.8.7 Build 110427 Rel 36550n). The vulnerability arises because the router's management UI accepts and stores hostnames submitted via DHCP without proper input sanitization or output encoding. An attacker connected to the local area network (LAN) can submit a maliciously crafted hostname containing JavaScript code. This code is stored persistently and later executed in the context of the administrator's browser when the management interface displays the hostname, such as during DHCP release or renew operations. The router employs weak/basic authentication mechanisms and does not adequately protect or isolate session tokens, enabling the attacker to steal the administrator's session cookie or token. With the stolen session, the attacker can perform administrative actions on the router, potentially altering configurations, redirecting traffic, or disabling security features. The vulnerability does not require user interaction or prior privileges but does require LAN access, limiting remote exploitation. The CVSS 3.1 vector (AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) indicates that the attack can be performed over the local network with low attack complexity, no privileges, and no user interaction, and it impacts confidentiality and integrity with a scope change. No patches or official fixes have been released yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure security, particularly for those using Mercury MR816v2 routers in their internal networks. Successful exploitation can lead to unauthorized administrative control over the router, allowing attackers to modify network configurations, intercept or redirect traffic, and disable security controls. This compromises the confidentiality and integrity of network communications and can facilitate further lateral movement or data exfiltration within the organization. The requirement for LAN access means that attackers must already have some foothold inside the network or physical access, which is common in environments with inadequate network segmentation or guest network controls. The weak authentication and session management exacerbate the risk by making session hijacking feasible. Given the critical role routers play in network security, this vulnerability could disrupt business operations and expose sensitive data. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, are particularly vulnerable to reputational and regulatory consequences if exploited.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface to trusted administrative hosts only, using VLAN segmentation or firewall rules to isolate the management network from general LAN access. 2. Disable DHCP hostname submission from untrusted devices or implement DHCP snooping and validation to prevent malicious hostname injection. 3. Monitor DHCP logs and router management UI for unusual or suspicious hostname entries indicative of attempted exploitation. 4. Enforce stronger authentication mechanisms on the router management interface, such as replacing basic authentication with more secure methods (e.g., HTTPS with client certificates or multi-factor authentication) if supported. 5. Regularly audit router firmware versions and configurations; engage with the vendor for patches or firmware updates addressing this vulnerability. 6. Educate network administrators about the risks of XSS in management interfaces and the importance of session protection. 7. Implement network access control (NAC) to limit unauthorized devices on the LAN. 8. If possible, replace vulnerable routers with models that have robust security features and proper input validation. 9. Use web application firewalls (WAF) or intrusion detection systems (IDS) tuned to detect suspicious activity related to DHCP hostname injection or management UI access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-65289: n/a
Description
A stored Cross site scripting (XSS) vulnerability in the Mercury MR816v2 (081C3114 4.8.7 Build 110427 Rel 36550n) router allows a remote attacker on the LAN to inject JavaScript into the router's management UI by submitting a malicious hostname. The injected script is stored and later executed in the context of an administrator's browser (for example after DHCP release/renew triggers the interface to display the stored hostname). Because the management interface uses weak/basic authentication and does not properly protect or isolate session material, the XSS can be used to exfiltrate the admin session and perform administrative actions.
AI-Powered Analysis
Technical Analysis
CVE-2025-65289 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Mercury MR816v2 router's management interface (firmware version 4.8.7 Build 110427 Rel 36550n). The vulnerability arises because the router's management UI accepts and stores hostnames submitted via DHCP without proper input sanitization or output encoding. An attacker connected to the local area network (LAN) can submit a maliciously crafted hostname containing JavaScript code. This code is stored persistently and later executed in the context of the administrator's browser when the management interface displays the hostname, such as during DHCP release or renew operations. The router employs weak/basic authentication mechanisms and does not adequately protect or isolate session tokens, enabling the attacker to steal the administrator's session cookie or token. With the stolen session, the attacker can perform administrative actions on the router, potentially altering configurations, redirecting traffic, or disabling security features. The vulnerability does not require user interaction or prior privileges but does require LAN access, limiting remote exploitation. The CVSS 3.1 vector (AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) indicates that the attack can be performed over the local network with low attack complexity, no privileges, and no user interaction, and it impacts confidentiality and integrity with a scope change. No patches or official fixes have been released yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure security, particularly for those using Mercury MR816v2 routers in their internal networks. Successful exploitation can lead to unauthorized administrative control over the router, allowing attackers to modify network configurations, intercept or redirect traffic, and disable security controls. This compromises the confidentiality and integrity of network communications and can facilitate further lateral movement or data exfiltration within the organization. The requirement for LAN access means that attackers must already have some foothold inside the network or physical access, which is common in environments with inadequate network segmentation or guest network controls. The weak authentication and session management exacerbate the risk by making session hijacking feasible. Given the critical role routers play in network security, this vulnerability could disrupt business operations and expose sensitive data. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, are particularly vulnerable to reputational and regulatory consequences if exploited.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface to trusted administrative hosts only, using VLAN segmentation or firewall rules to isolate the management network from general LAN access. 2. Disable DHCP hostname submission from untrusted devices or implement DHCP snooping and validation to prevent malicious hostname injection. 3. Monitor DHCP logs and router management UI for unusual or suspicious hostname entries indicative of attempted exploitation. 4. Enforce stronger authentication mechanisms on the router management interface, such as replacing basic authentication with more secure methods (e.g., HTTPS with client certificates or multi-factor authentication) if supported. 5. Regularly audit router firmware versions and configurations; engage with the vendor for patches or firmware updates addressing this vulnerability. 6. Educate network administrators about the risks of XSS in management interfaces and the importance of session protection. 7. Implement network access control (NAC) to limit unauthorized devices on the LAN. 8. If possible, replace vulnerable routers with models that have robust security features and proper input validation. 9. Use web application firewalls (WAF) or intrusion detection systems (IDS) tuned to detect suspicious activity related to DHCP hostname injection or management UI access.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693852147515e08d31601b94
Added to database: 12/9/2025, 4:45:08 PM
Last enriched: 12/16/2025, 5:51:57 PM
Last updated: 2/7/2026, 11:03:01 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.