First published: Mon Feb 24 2025(Updated: )
A vulnerability classified as problematic has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected is an unknown function of the file /goform/portForwardingCfg of the component Port Forwarding Submenu. The manipulation of the argument pf_Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
FiberHome AN5506-01A | ||
All of | ||
Fiberhome An5506-01a Firmware | =rp2511 | |
Fiberhome AN5506 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1614 is classified as a problematic vulnerability affecting the FiberHome AN5506-01A ONU GPON.
Fixing CVE-2025-1614 involves applying patches provided by FiberHome or configuring the affected settings in the port forwarding submenu.
CVE-2025-1614 affects the Port Forwarding Submenu of the FiberHome AN5506-01A ONU GPON.
CVE-2025-1614 allows for cross-site scripting (XSS) attacks due to improper handling of the pf_Description argument.
Yes, if you are using the FiberHome AN5506-01A ONU GPON, your device is at risk due to the CVE-2025-1614 vulnerability.