This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system.
Metrics
Affected Vendors & Products
Fixes
Solution
Upgrade PPC 2K15X Router to firmware version V2.3.24
Workaround
i. Disable remote management ii. Restrict admin access to trusted LAN devices only iii. Avoid accessing the management UI via untrusted links
References
History
Tue, 16 Sep 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system. | |
Title | Cross-Site Scripting (XSS) Vulnerability in PPC XPON ONT Wi-Fi Router | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-09-16T12:18:58.822Z
Reserved: 2025-09-16T10:30:43.804Z
Link: CVE-2025-10546

No data.

No data.

No data.

No data.