A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
Metrics
Affected Vendors & Products
References
History
Thu, 03 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 03 Jul 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload. | |
Title | Cross-site scripting via dst parameter in RouterOS WiFi hotspot | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Toreon
Published: 2025-07-03T11:18:26.211Z
Updated: 2025-07-03T13:17:13.946Z
Reserved: 2025-06-24T07:00:12.112Z
Link: CVE-2025-6563

Updated: 2025-07-03T13:07:39.213Z

Status : Awaiting Analysis
Published: 2025-07-03T12:15:25.077
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-6563

No data.