VYPR
High severity7.1NVD Advisory· Published Mar 17, 2025· Updated Apr 15, 2026

CVE-2025-25612

CVE-2025-25612

Description

FS Inc S3150-8T2F prior to version S3150-8T2F_2.2.0D_135103 is vulnerable to Cross Site Scripting (XSS) in the Time Range Configuration functionality of the administration interface. An attacker can inject malicious JavaScript into the "Time Range Name" field, which is improperly sanitized. When this input is saved, it is later executed in the browser of any user accessing the affected page, including administrators, resulting in arbitrary script execution in the user's browser.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in FS Inc S3150-8T2F switch's Time Range Name field allows attackers to execute arbitrary JavaScript in admin browsers.

Vulnerability

Overview

CVE-2025-25612 is a stored cross-site scripting (XSS) vulnerability affecting FS Inc S3150-8T2F switches prior to firmware version S3150-8T2F_2.2.0D_135103. The flaw resides in the Time Range Configuration functionality of the administration interface. The "Time Range Name" input field does not properly sanitize user-supplied data, allowing an attacker to inject malicious JavaScript code that is stored on the device [2].

Exploitation

An attacker with network access to the switch's management interface can exploit this vulnerability by submitting a crafted payload in the Time Range Name field. No authentication is required to trigger the stored payload; once saved, the malicious script executes in the browser of any user—including administrators—who views the affected configuration page. This makes the attack particularly dangerous as it can target privileged users without additional interaction [2].

Impact

Successful exploitation enables arbitrary script execution in the context of the victim's browser session. An attacker could steal session cookies, capture keystrokes, perform actions on behalf of the administrator, or deface the management interface. Because the script runs in the admin's browser, it can bypass network-level controls and potentially lead to full compromise of the switch's administrative functions [2].

Mitigation

FS Inc has addressed this vulnerability in firmware version S3150-8T2F_2.2.0D_135103. Users are strongly advised to upgrade to this or a later release. No workarounds are documented; restricting access to the management interface to trusted networks can reduce exposure but does not eliminate the risk [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.