Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65349: n/a

0
Medium
VulnerabilityCVE-2025-65349cvecve-2025-65349
Published: Thu Jan 15 2026 (01/15/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A Stored Cross-Site Scripting (XSS) vulnerability in Web management interface in Each Italy Wireless Mini Router WIRELESS-N 300M v28K.MiniRouter.20190211 allows attackers to execute arbitrary scripts via a crafted payload due to unsanitized repeater AP SSID value when is displayed in any page at /index.htm.

AI-Powered Analysis

AILast updated: 01/15/2026, 20:30:06 UTC

Technical Analysis

CVE-2025-65349 is a stored cross-site scripting (XSS) vulnerability identified in the web management interface of the Each Italy Wireless Mini Router WIRELESS-N 300M v28K.MiniRouter.20190211. The vulnerability stems from the failure to properly sanitize the repeater AP SSID value before rendering it on the /index.htm page of the router’s web interface. Since the SSID is user-controllable, an attacker can inject malicious JavaScript code into the SSID field. When an administrator or user accesses the router’s management page, the injected script executes in the context of the router’s web interface, potentially allowing the attacker to hijack sessions, steal credentials, or perform actions on behalf of the user. This type of stored XSS is particularly dangerous because the malicious payload persists on the device and affects any user who views the page. The vulnerability does not require authentication to inject the payload if the attacker can set the SSID (e.g., by configuring a repeater AP or via other network access). However, exploitation requires the victim to access the affected page. No CVSS score has been assigned yet, and no public exploits are known at this time. The vulnerability highlights the risks associated with insufficient input validation in embedded device management interfaces, which are often overlooked in security assessments. The Each Italy Wireless Mini Router is a consumer-grade device, but such vulnerabilities can be leveraged to pivot attacks into internal networks, especially in small office or home office environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for small and medium enterprises (SMEs) and home office users relying on the Each Italy Wireless Mini Router or similar devices. Exploitation could lead to unauthorized access to router management functions, enabling attackers to alter network configurations, redirect traffic, or deploy further malware. The stored nature of the XSS means that multiple users accessing the interface could be compromised, increasing the attack surface. Confidentiality is at risk due to potential credential theft and session hijacking. Integrity can be compromised if attackers modify router settings. Availability could be indirectly affected if attackers disrupt network configurations or cause device malfunctions. Given the router’s role as a network gateway, successful exploitation could facilitate lateral movement into internal networks, threatening broader organizational assets. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks. European organizations with limited IT security resources may be particularly vulnerable due to the common use of consumer-grade routers without rigorous security controls.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first restrict access to the router’s web management interface by limiting it to trusted IP addresses or disabling remote management altogether. Network segmentation should be employed to isolate management interfaces from general user networks. Administrators should update the router firmware if and when a vendor patch becomes available, or consider replacing the device with a more secure alternative if no patch is forthcoming. In the interim, monitoring network traffic for unusual SSID values or suspicious management interface access can help detect exploitation attempts. Employing web application firewalls or intrusion detection systems that can identify XSS payloads may provide additional protection. Educating users and administrators about the risks of interacting with untrusted network devices and the importance of strong, unique credentials for device management is also critical. Finally, vendors should be urged to implement proper input validation and output encoding in their management interfaces to prevent such vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69694af11ab3796b104b1134

Added to database: 1/15/2026, 8:15:45 PM

Last enriched: 1/15/2026, 8:30:06 PM

Last updated: 1/15/2026, 9:29:27 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats