Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade PPC 2K15X Router to firmware version V2.3.24
Vendor Workaround
i. Disable remote management ii. Restrict admin access to trusted LAN devices only iii. Avoid accessing the management UI via untrusted links
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29571 | This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system. |
Tue, 16 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system. | |
| Title | Cross-Site Scripting (XSS) Vulnerability in PPC XPON ONT Wi-Fi Router | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-09-16T18:25:22.896Z
Reserved: 2025-09-16T10:30:43.804Z
Link: CVE-2025-10546
Updated: 2025-09-16T18:25:19.130Z
Status : Deferred
Published: 2025-09-16T13:15:49.930
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-10546
No data.
OpenCVE Enrichment
No data.
EUVD