CVE-2025-56008
Description
Cross site scripting (XSS) vulnerability in KeeneticOS before 4.3 at "Wireless ISP" page allows attackers located near to the router to takeover the device via adding additional users with full permissions.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
XSS in KeeneticOS before 4.3 at the Wireless ISP page lets nearby attackers gain admin access via crafted SSID payloads.
Vulnerability
Overview
A stored cross-site scripting (XSS) vulnerability exists in KeeneticOS versions before 4.3 on the "Wireless ISP" page. The vulnerability arises because the router does not properly sanitize access point SSID names displayed on this page, allowing an attacker to inject arbitrary HTML and JavaScript into the administrative interface [1][2].
Attack
Vector and Exploitation
An attacker within Wi-Fi range can broadcast a specially crafted SSID using tools like scapy. The payload must fit within the 32-character SSID limit, but the attacker can work around this by broadcasting multiple beacon frames that store fragments in JavaScript variables and then a final frame that assembles and executes the full payload. When an administrator views the Wireless ISP page, the injected script executes in the context of the admin session [2].
Impact
The attacker can exfiltrate the session cookie via postMessage to an attacker-controlled endpoint and then use that authentication token to add new administrative users with full permissions, effectively taking over the router [1][2].
Mitigation
Keenetic has addressed this vulnerability in KeeneticOS version 4.3. Users are advised to update to the latest firmware. No workarounds are provided for older versions [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- KeeneticOS/KeeneticOSdescription
- Range: <4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- keenetic.com/global/securitynvdVendor Advisory
- keenetic.comnvdProduct
- github.com/notdenied/writeups/blob/main/CVE/CVE-2025-56008.mdnvd
News mentions
0No linked articles in our index yet.