Vulnerability Description
A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.
Related Weaknesses (CWE)
References
- https://www.toreon.com/how-a-ski-trip-led-to-a-cve-in-a-wi-fi-hotspot/
- https://www.toreon.com/how-a-ski-trip-led-to-a-cve-in-a-wi-fi-hotspot/
FAQ
What is CVE-2025-6563?
CVE-2025-6563 is a documented vulnerability. A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim...
How severe is CVE-2025-6563?
CVSS scoring is not yet available for CVE-2025-6563. Check NVD for updates.
Is there a patch for CVE-2025-6563?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.