Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2019-25284
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-07 Jan, 2026 | 23:11
Updated At-08 Jan, 2026 | 18:16
Rejected At-
▼CVE Numbering Authority (CNA)
V-SOL GPON/EPON OLT Platform V2.03.62R_IPv6 v2.03 Reflected Cross-Site Scripting Vulnerability

V-SOL GPON/EPON OLT Platform v2.03 contains multiple reflected cross-site scripting vulnerabilities due to improper input sanitization in various script parameters. Attackers can exploit these vulnerabilities by injecting malicious HTML and script code to execute arbitrary scripts in a victim's browser session.

Affected Products
Vendor
Guangzhou V
Product
V-SOL GPON/EPON OLT Platform
Versions
Affected
  • V2.03.62R_IPv6
  • V2.03.54R
  • V2.03.52R
  • V2.03.49
  • V2.03.47
  • V2.03.40
  • V2.03.26
  • V2.03.24
  • V1.8.6
  • V1.4
Problem Types
TypeCWE IDDescription
CWECWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
4.05.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Version: 4.0
Base score: 5.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
LiquidWorm as Gjoko Krstic of Zero Science Lab
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5537.php
third-party-advisory
https://packetstormsecurity.com/files/154631
exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/167864
vdb-entry
https://cxsecurity.com/issue/WLB-2019090194
third-party-advisory
https://www.vsolcn.com/
product
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5537.php
Resource:
third-party-advisory
Hyperlink: https://packetstormsecurity.com/files/154631
Resource:
exploit
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/167864
Resource:
vdb-entry
Hyperlink: https://cxsecurity.com/issue/WLB-2019090194
Resource:
third-party-advisory
Hyperlink: https://www.vsolcn.com/
Resource:
product
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5537.php
exploit
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5537.php
Resource:
exploit
Details not found