CVE-2025-65228
📋 TL;DR
A stored cross-site scripting vulnerability in the R.V.R. Elettronica TLK302T telemetry controller web management interface allows attackers to inject malicious scripts that execute when users view affected pages. This affects organizations using the TLK302T controller with vulnerable firmware. Attackers could steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- R.V.R. Elettronica TLK302T telemetry controller
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the management interface leading to device reconfiguration, data theft, or use as a pivot point into the industrial network.
Likely Case
Session hijacking allowing unauthorized access to the management interface, potentially leading to device misconfiguration or telemetry data manipulation.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external access to the management interface.
🎯 Exploit Status
Exploitation requires access to the management interface, which typically requires authentication. The GitHub reference contains technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.rvr.it/en/products/components/telemetry-units-system/tlk300-series/tlk302t/
Restart Required: No
Instructions:
Check vendor website for firmware updates. If available, download and apply following vendor instructions.
🔧 Temporary Workarounds
Network Segmentation
allIsolate the TLK302T management interface from untrusted networks
Access Control Lists
allRestrict access to the management interface to authorized IP addresses only
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the device from untrusted networks
- Use a web application firewall (WAF) with XSS protection rules in front of the management interface
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface or console. If version is 1.5.1799, device is vulnerable.
Check Version:
Check via web interface at System > Firmware or similar menu
Verify Fix Applied:
Verify firmware version has been updated to a version later than 1.5.1799
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to management interface with script tags
- Multiple failed login attempts followed by successful login
Network Indicators:
- HTTP requests containing script tags or JavaScript payloads to the management interface
SIEM Query:
source="tlk302t_logs" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:")