Cross-Site Scripting Vulnerability in Grandstream GXP1625 Network Status Page
CVE-2025-14186

5.1MEDIUM

Key Information:

Status
Vendor
CVE Published:
7 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-14186?

A security flaw has been found in the Network Status Page of the Grandstream GXP1625 at version 1.0.7.4, which allows for cross-site scripting via the 'vpn_ip' argument in the /cgi-bin/api.values.post file. This vulnerability could enable an attacker to manipulate data on affected systems, potentially leading to unauthorized access and exploitation. The exploit details have been publicly released, indicating the gravity of the threat, and there has been no response from the vendor regarding this disclosure.

Affected Version(s)

GXP1625 1.0.7.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

cccll (VulDB User)
.
CVE-2025-14186 : Cross-Site Scripting Vulnerability in Grandstream GXP1625 Network Status Page