A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
History

Thu, 03 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Jul 2025 11:30:00 +0000

Type Values Removed Values Added
Description A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
Title Cross-site scripting via dst parameter in RouterOS WiFi hotspot
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Toreon

Published: 2025-07-03T11:18:26.211Z

Updated: 2025-07-03T13:17:13.946Z

Reserved: 2025-06-24T07:00:12.112Z

Link: CVE-2025-6563

cve-icon Vulnrichment

Updated: 2025-07-03T13:07:39.213Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-03T12:15:25.077

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-6563

cve-icon Redhat

No data.