Skip to main content

CVE-2025-57389: n/a

High
VulnerabilityCVE-2025-57389cvecve-2025-57389
Published: Wed Oct 01 2025 (10/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A reflected cross-site scripted (XSS) vulnerability in the /admin/system/packages endpoint of Luci OpenWRT v18.06.2 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload.

AI-Powered Analysis

AILast updated: 10/01/2025, 20:33:05 UTC

Technical Analysis

CVE-2025-57389 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the /admin/system/packages endpoint of Luci OpenWRT version 18.06.2. OpenWRT is a widely used open-source Linux-based operating system primarily deployed on embedded devices such as routers. The Luci web interface provides administrative access to OpenWRT devices. This vulnerability allows an attacker to inject and execute arbitrary JavaScript code in the context of a victim user's browser when they access a specially crafted URL or payload targeting the vulnerable endpoint. Because it is a reflected XSS, the malicious script is not stored on the server but reflected off the vulnerable endpoint in the HTTP response. Successful exploitation requires the victim to interact with the crafted link, which could be delivered via phishing emails, malicious websites, or other social engineering methods. The arbitrary JavaScript execution can lead to session hijacking, credential theft, unauthorized actions on behalf of the user, or further exploitation of the victim's browser environment. The vulnerability affects the administrative interface, which is typically accessible only to authenticated users or users on the local network, limiting the attack surface to some extent. However, many OpenWRT devices have exposed administrative interfaces due to misconfigurations or remote management enabled, increasing risk. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. There is no information about patches or fixed versions, so affected users should assume the vulnerability is present in version 18.06.2 and take immediate mitigation steps.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to enterprises, ISPs, and critical infrastructure operators that rely on OpenWRT-based devices for network routing and management. Exploitation could lead to compromise of administrative sessions, allowing attackers to manipulate device configurations, intercept or redirect network traffic, or pivot into internal networks. This could result in data breaches, disruption of network services, or facilitation of further attacks such as malware deployment or lateral movement. The impact is heightened in environments where administrative interfaces are exposed externally or where users have elevated privileges. Given the widespread use of OpenWRT in small office/home office (SOHO) and enterprise-grade routers across Europe, the vulnerability could affect a broad range of organizations. Additionally, the ability to execute arbitrary scripts in a browser context could be leveraged to target specific users within organizations, potentially enabling espionage or sabotage. The lack of a patch increases the urgency for temporary mitigations to reduce exposure.

Mitigation Recommendations

1. Immediately restrict access to the Luci administrative interface by implementing network-level controls such as firewall rules to limit access to trusted IP addresses or VPN-only access. 2. Disable remote administration features on OpenWRT devices unless absolutely necessary. 3. Educate users and administrators to avoid clicking on suspicious links or opening untrusted emails that could deliver the malicious payload. 4. Monitor network traffic and device logs for unusual access patterns or attempts to access the /admin/system/packages endpoint with suspicious parameters. 5. Where possible, upgrade to a newer, patched version of OpenWRT or Luci once available. If no patch is currently available, consider applying custom input validation or web application firewall (WAF) rules to detect and block reflected XSS payloads targeting this endpoint. 6. Employ browser security features such as Content Security Policy (CSP) to limit the impact of injected scripts. 7. Regularly audit device configurations to ensure administrative interfaces are not exposed unnecessarily and that strong authentication mechanisms are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68dd8fe35b743f3e8e9287c2

Added to database: 10/1/2025, 8:32:35 PM

Last enriched: 10/1/2025, 8:33:05 PM

Last updated: 10/1/2025, 8:33:05 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats