Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-26054 PoC — Infinxt iEdge 100 跨站脚本漏洞

Source
Associated Vulnerability
Title:Infinxt iEdge 100 跨站脚本漏洞 (CVE-2025-26054)
Description:Infinxt iEdge 100是Infinxt公司的一款适用于中小型分支机构的下一代安全 SD-WAN 设备。 Infinxt iEdge 100 2.1.32版本存在跨站脚本漏洞,该漏洞源于LAN配置中的描述字段存在跨站脚本。
Description
CVE-2025-26054
Readme
# CVE-2025-26054
CVE-2025-26054

# Author: Rohan Deshpande

**Stored Cross Site Scripting**
**Summary** Stored XSS (Cross-Site Scripting) is a security vulnerability that 
occurs when an attacker injects malicious scripts into a web 
application, which are then stored on the server and served to users. 
When users access the affected content, the script executes in their 
browsers, potentially leading to data theft, session hijacking, and 
unauthorized actions. This type of attack can have severe 
consequences for both users and the integrity of the web application.

**Severity** High

**Impact** The impact of Stored XSS can be severe, as it allows attackers to 
execute malicious scripts in the browsers of users who visit the 
compromised page. This can lead to data theft, such as capturing 
sensitive information (e.g., cookies, login credentials), session 
hijacking, and unauthorized actions on behalf of the user. 

**Affected URL** http://<ip>:<port>/index 

**Recommendation** To mitigate Stored XSS vulnerabilities, implement proper input 
validation and output encoding to ensure that user-supplied data is 
treated as data, not executable code. Use security libraries and 
frameworks that automatically handle XSS protection, and employ 
Content Security Policy (CSP) to restrict the execution of scripts. 
Regular security testing and code reviews are also essential to 
identify and remediate potential weaknesses. 

**Proof of Concept**
1. Login to the console and navigate to Network → LAN.
2. Fill the necessary details and capture the request on burp.
3. Inject a simple payload like ssdd<h1>dd12<script>alert(1)</script></h1>
into the description parameter.
4. Forward it and Navigate to summary. Notice XSS triggered.
File Snapshot

[4.0K] /data/pocs/4455c5f1362ffc43243d9075bc67cea3cc3e9973 └── [1.7K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.