{"uuid": "8848e578-0c4b-4a58-93ba-4a593c2443e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26202", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6563", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26202\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Cross-Site Scripting (XSS) vulnerability exists in the WPA/WAPI Passphrase field of the Wireless Security settings (2.4GHz &amp; 5GHz bands) in DZS Router Web Interface. An authenticated attacker can inject malicious JavaScript into the passphrase field, which is stored and later executed when an administrator views the passphrase via the \"Click here to display\" option on the Status page\n\ud83d\udccf Published: 2025-03-04T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-05T16:08:28.472Z\n\ud83d\udd17 References:\n1. http://dzs.com\n2. http://znid-gpon-2428b1-0st.com\n3. https://github.com/A17-ba/CVE-2025-26202-Details", "creation_timestamp": "2025-03-05T16:32:29.000000Z"}