CVE-2025-34261

5.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Advantech WISE-DeviceOn Server allows authenticated attackers to inject malicious scripts into device group names and descriptions. When other users view these device groups, the scripts execute in their browser context, potentially enabling session hijacking and unauthorized actions. All organizations running affected versions of WISE-DeviceOn Server are vulnerable.

💻 Affected Systems

Products:
  • Advantech WISE-DeviceOn Server
Versions: All versions prior to 5.4
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit; affects all deployments with device group functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains administrative privileges, compromises all connected devices, steals sensitive data, and maintains persistent access to the entire infrastructure.

🟠

Likely Case

Attacker hijacks user sessions, performs unauthorized actions as victims, and potentially escalates privileges within the WISE-DeviceOn Server.

🟢

If Mitigated

Limited to authenticated users only, with potential for session compromise but no direct system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated; stored XSS payloads persist until removed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4

Vendor Advisory: https://advcloudfiles.advantech.com/cms/2ca1b071-fd78-4d7f-8a2a-7b4537a95d19/Security%20Advisory%20PDF%20File/SECURITY-ADVISORY----DeviceOn-20251208-2.pdf

Restart Required: Yes

Instructions:

1. Download WISE-DeviceOn Server version 5.4 from official Advantech sources. 2. Backup current configuration and data. 3. Stop the WISE-DeviceOn Server service. 4. Install version 5.4 following vendor documentation. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Input Validation via WAF

all

Configure web application firewall to filter XSS payloads in POST requests to /rmm/v1/devicegroups/ endpoint

Restrict Device Group Creation

all

Limit device group creation permissions to trusted administrators only

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
  • Monitor and audit all device group creation/modification activities for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check if current version is below 5.4 by accessing the admin interface or checking installation files

Check Version:

Check web interface admin panel or consult installation documentation for version information

Verify Fix Applied:

After upgrading to 5.4, attempt to inject basic XSS payloads (like <script>alert('test')</script>) into device group name/description fields and verify they are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual device group creation/modification patterns
  • POST requests to /rmm/v1/devicegroups/ containing script tags or JavaScript code

Network Indicators:

  • HTTP requests with suspicious payloads in device group parameters
  • Unexpected JavaScript execution in device group listings

SIEM Query:

source="wise-deviceon" AND (uri_path="/rmm/v1/devicegroups/" AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:"))

🔗 References

📤 Share & Export