Linksys E5600 Router, Stored Cross-Site Scripting (XSS), CVE-2025-22997 (Critical)

Listen to this Post

How CVE-2025-22997 Works

The vulnerability exists in the `prf_table_content` component of Linksys E5600 Router firmware version 1.1.0.26. Attackers inject malicious JavaScript or HTML payloads into the `desc` parameter, which is stored in the router’s web interface. When an administrator views the affected page, the payload executes in their browser, allowing session hijacking, credential theft, or router configuration manipulation. The attack persists until the malicious entry is removed, making it a stored XSS flaw.

DailyCVE Form:

Platform: Linksys E5600
Version: 1.1.0.26
Vulnerability: Stored XSS
Severity: Critical
Date: 06/11/2025

Prediction: Patch by Q3 2025

What Undercode Say:

Exploitation:

1. Craft Payload:

<script>alert(document.cookie)</script>

2. Inject via `desc`:

POST /apply.cgi HTTP/1.1
Host: 192.168.1.1
Content-Type: application/x-www-form-urlencoded
desc=<script>exfiltrate()</script>

Mitigation:

1. Input Sanitization:

function sanitize(input) {
return input.replace(/<script.?>.?<\/script>/gi, "");
}

2. WAF Rule:

location /apply.cgi {
modsecurity_rules 'SecRule ARGS:desc "@contains <script>" "deny,status:403"';
}

Detection:

grep -r "prf_table_content" /www/cgi-bin/

Post-Patch Verification:

curl -X POST -d "desc=<script>test()</script>" http://192.168.1.1/apply.cgi | grep "XSS detected"

Router Hardening:

iptables -A INPUT -p tcp --dport 80 -m string --string "<script>" --algo bm -j DROP

Log Analysis:

cat /var/log/httpd.log | grep "desc=" | grep -q "<script>" && echo "XSS Attempt"

Firmware Check:

openssl dgst -sha256 firmware.bin | grep "expected_hash"

Temporary Workaround:

Disable remote admin access:

nvram set http_enable=0 && nvram commit

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top