CVE-2025-41750

7.1 HIGH

📋 TL;DR

An unauthenticated cross-site scripting (XSS) vulnerability in pxc_PortCfg.php allows attackers to trick authenticated users into clicking malicious links, enabling unauthorized changes to device configuration parameters via the web-based management interface. This affects systems running vulnerable versions of the software with web management exposed. The vulnerability does not allow system-level access or session hijacking due to httpOnly cookie protection.

💻 Affected Systems

Products:
  • Unknown specific product - referenced as affected software with pxc_PortCfg.php
Versions: Unknown specific versions
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with web-based management interface accessible. The specific product name is not provided in the CVE description.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical device configuration parameters, potentially disrupting network operations or enabling further attacks by changing security settings.

🟠

Likely Case

Attackers modify non-critical configuration settings, causing operational disruptions or enabling data interception through parameter changes.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts, preventing unauthorized configuration changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into clicking malicious links. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://certvde.com/de/advisories/VDE-2025-071

Restart Required: No

Instructions:

1. Monitor vendor advisory for patch availability. 2. Apply vendor-provided security updates when released. 3. Verify fix by testing XSS payloads against patched version.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation and output encoding in pxc_PortCfg.php to prevent XSS payload execution.

Web Application Firewall (WAF)

all

Deploy WAF with XSS protection rules to block malicious requests.

🧯 If You Can't Patch

  • Restrict access to web management interface using network segmentation and firewall rules
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Test pxc_PortCfg.php with XSS payloads like <script>alert('XSS')</script> in parameters and check if script executes.

Check Version:

Unknown - check software documentation for version identification

Verify Fix Applied:

Retest with XSS payloads after applying fixes; scripts should not execute and input should be properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values in pxc_PortCfg.php requests
  • Script tags or JavaScript in URL parameters

Network Indicators:

  • HTTP requests to pxc_PortCfg.php with suspicious parameters
  • Multiple failed attempts with XSS payloads

SIEM Query:

source="web_logs" AND uri="*pxc_PortCfg.php*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export