CVE-2025-56007
Description
CRLF-injection in KeeneticOS before 4.3 at "/auth" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CRLF injection in KeeneticOS /auth endpoint allows unauthenticated attackers to achieve XSS and device takeover via crafted URL.
Vulnerability
CVE-2025-56007 is a CRLF injection vulnerability in the /auth API endpoint of KeeneticOS versions before 4.3. The endpoint accepts a hidden url parameter that, when provided, sets the Location header for redirecting authenticated users. However, the server does not sanitize the parameter, allowing an attacker to inject CRLF sequences (%0d%0a or %0a) to insert arbitrary HTTP headers and body content into the response [2].
Exploitation
An attacker can craft a malicious link that, when visited by an authenticated victim, triggers the injection. By starting the payload with %0a, the attacker can suppress the redirect and set the Content-Type header to text/html, then inject arbitrary HTML and JavaScript. The final payload takes the form: /auth?url=%0aContent-Type:text/html%0a%0a [2]. The victim must be logged into the router's admin panel for the exploit to succeed, but no other authentication is required from the attacker.
Impact
Successful exploitation results in reflected XSS within the router's administrative interface. An attacker can then execute arbitrary JavaScript in the context of the admin session, enabling full device takeover. This includes adding new users with administrative privileges, modifying network settings, or exfiltrating sensitive data [1][2].
Mitigation
Keenetic has addressed this vulnerability in KeeneticOS version 4.3 and later. Users are strongly advised to update their firmware to the latest version. No workarounds are available for unpatched versions [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- KeeneticOS/KeeneticOSdescription
- Range: <4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- keenetic.com/global/securitynvdVendor Advisory
- keenetic.comnvdProduct
- github.com/notdenied/writeups/blob/main/CVE/CVE-2025-56007.mdnvd
News mentions
0No linked articles in our index yet.