Listen to this Post
How CVE-2025-22997 Works
The vulnerability exists in the `prf_table_content` component of Linksys E5600 Router firmware version 1.1.0.26. Attackers inject malicious JavaScript or HTML payloads into the `desc` parameter, which is stored in the router’s web interface. When an administrator views the affected page, the payload executes in their browser, allowing session hijacking, credential theft, or router configuration manipulation. The attack persists until the malicious entry is removed, making it a stored XSS flaw.
DailyCVE Form:
Platform: Linksys E5600
Version: 1.1.0.26
Vulnerability: Stored XSS
Severity: Critical
Date: 06/11/2025
Prediction: Patch by Q3 2025
What Undercode Say:
Exploitation:
1. Craft Payload:
<script>alert(document.cookie)</script>
2. Inject via `desc`:
POST /apply.cgi HTTP/1.1 Host: 192.168.1.1 Content-Type: application/x-www-form-urlencoded desc=<script>exfiltrate()</script>
Mitigation:
1. Input Sanitization:
function sanitize(input) { return input.replace(/<script.?>.?<\/script>/gi, ""); }
2. WAF Rule:
location /apply.cgi { modsecurity_rules 'SecRule ARGS:desc "@contains <script>" "deny,status:403"'; }
Detection:
grep -r "prf_table_content" /www/cgi-bin/
Post-Patch Verification:
curl -X POST -d "desc=<script>test()</script>" http://192.168.1.1/apply.cgi | grep "XSS detected"
Router Hardening:
iptables -A INPUT -p tcp --dport 80 -m string --string "<script>" --algo bm -j DROP
Log Analysis:
cat /var/log/httpd.log | grep "desc=" | grep -q "<script>" && echo "XSS Attempt"
Firmware Check:
openssl dgst -sha256 firmware.bin | grep "expected_hash"
Temporary Workaround:
Disable remote admin access:
nvram set http_enable=0 && nvram commit
Sources:
Reported By: nvd.nist.gov
Extra Source Hub:
Undercode