Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65349: n/a

0
Medium
VulnerabilityCVE-2025-65349cvecve-2025-65349
Published: Thu Jan 15 2026 (01/15/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65349 is a stored Cross-Site Scripting (XSS) vulnerability found in the web management interface of the Each Italy Wireless Mini Router WIRELESS-N 300M v28K. MiniRouter. 20190211. The vulnerability arises from improper sanitization of the repeater AP SSID value, which is reflected on the /index. htm page, allowing attackers to inject and execute arbitrary scripts. Exploitation requires the attacker to have low privileges and some user interaction, but it can lead to partial compromise of confidentiality and integrity. The CVSS score is 5. 4 (medium severity), indicating moderate risk. No known exploits are currently in the wild, and no patches have been published yet. European organizations using this router model should be cautious, especially in countries with higher deployment of this hardware.

AI-Powered Analysis

AILast updated: 01/22/2026, 21:39:58 UTC

Technical Analysis

CVE-2025-65349 is a stored Cross-Site Scripting (XSS) vulnerability identified in the web management interface of the Each Italy Wireless Mini Router WIRELESS-N 300M v28K.MiniRouter.20190211. The vulnerability stems from the failure to properly sanitize the repeater Access Point (AP) SSID value before rendering it on the /index.htm page. Because the SSID value is user-controllable and reflected without adequate filtering, an attacker can craft a malicious SSID payload that, when displayed by the router’s web interface, executes arbitrary JavaScript code in the context of the victim’s browser session. This type of vulnerability is classified under CWE-79. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), and low privileges (PR:L), with user interaction needed (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact affects confidentiality and integrity partially (C:L/I:L), but does not affect availability (A:N). The vulnerability allows attackers to potentially steal session cookies, manipulate the router’s web interface, or perform actions on behalf of the legitimate user, leading to partial compromise of the device’s management. No patches or known exploits are currently available, and the vulnerability was published on January 15, 2026. The router model affected is a consumer-grade wireless mini router, commonly used in small office/home office (SOHO) environments.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and residential users relying on the Each Italy Wireless Mini Router WIRELESS-N 300M, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to the router’s management interface, enabling attackers to steal sensitive configuration data or manipulate network settings. This could facilitate further attacks such as network traffic interception or redirection. While the vulnerability does not directly affect availability, the compromise of confidentiality and integrity can undermine network security and user privacy. In environments where these routers are used as part of critical infrastructure or in home offices connected to corporate networks, the risk is amplified. The requirement for low privileges and user interaction means attackers might leverage social engineering or insider threats. The absence of known exploits reduces immediate risk but also means organizations should proactively monitor and prepare for potential future attacks.

Mitigation Recommendations

To mitigate CVE-2025-65349, organizations should first restrict access to the router’s web management interface by limiting it to trusted networks and using strong authentication mechanisms. Network segmentation can prevent unauthorized access from less secure network segments. Administrators should monitor router logs and network traffic for unusual activity indicative of exploitation attempts. Since no official patch is available, users should consider replacing vulnerable devices with updated models or firmware from trusted vendors. If possible, disable the repeater functionality or SSID broadcasting features that accept external input until a fix is released. Educate users about the risks of interacting with suspicious network devices or SSIDs. Implement web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block XSS payloads targeting the router’s interface. Finally, maintain an inventory of network devices to quickly identify and isolate vulnerable hardware.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69694af11ab3796b104b1134

Added to database: 1/15/2026, 8:15:45 PM

Last enriched: 1/22/2026, 9:39:58 PM

Last updated: 2/6/2026, 10:41:40 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats