Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57389: n/a

0
Medium
VulnerabilityCVE-2025-57389cvecve-2025-57389
Published: Wed Oct 01 2025 (10/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A reflected cross-site scripting (XSS) vulnerability in the /admin/system/packages endpoint of Luci OpenWRT v18.06.2 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload. This vulnerability was fixed in OpenWRT v19.07.0.

AI-Powered Analysis

AILast updated: 10/18/2025, 03:46:36 UTC

Technical Analysis

CVE-2025-57389 is a reflected cross-site scripting (XSS) vulnerability affecting the /admin/system/packages endpoint in Luci OpenWRT version 18.06.2. This vulnerability arises because the endpoint improperly sanitizes user-supplied input, allowing attackers to inject malicious JavaScript code that is reflected back in the HTTP response. When a user with access to the vulnerable interface interacts with a crafted URL or payload, the malicious script executes in their browser context. This can lead to theft of session cookies, unauthorized actions performed on behalf of the user, or redirection to malicious sites. The vulnerability requires network access (AV:N), low attack complexity (AC:L), and privileges (PR:L), meaning the attacker must have some authenticated access to the device's web interface. User interaction is also required (UI:R), such as clicking a malicious link. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the vulnerable component. The vulnerability was addressed in OpenWRT version 19.07.0 by properly sanitizing inputs and preventing script injection. No known exploits are currently reported in the wild. This vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to network devices running vulnerable OpenWRT versions, especially routers and gateways managed via the Luci web interface. Successful exploitation could allow attackers to hijack administrative sessions, manipulate device configurations, or pivot within the network. This could lead to compromised network integrity and confidentiality, potentially exposing sensitive internal communications or enabling further attacks. Organizations relying on OpenWRT 18.06.2 in critical infrastructure or enterprise environments may face service disruptions or data breaches if attackers exploit this flaw. The requirement for some privilege and user interaction limits mass exploitation but targeted attacks against administrators or privileged users remain a concern. Given the widespread use of OpenWRT in European ISPs, enterprises, and IoT deployments, the impact could be significant if unpatched devices are present.

Mitigation Recommendations

European organizations should immediately verify if any network devices or infrastructure components are running Luci OpenWRT version 18.06.2 or earlier vulnerable versions. The primary mitigation is to upgrade all affected devices to OpenWRT version 19.07.0 or later, where the vulnerability is fixed. If upgrading is not immediately feasible, organizations should restrict access to the Luci web interface to trusted networks only, implement strong authentication controls, and educate administrators to avoid clicking untrusted links. Network segmentation can limit exposure of vulnerable devices. Additionally, deploying web application firewalls (WAFs) or intrusion detection systems (IDS) with signatures for reflected XSS attempts targeting OpenWRT interfaces can provide temporary protection. Regular monitoring of device logs for suspicious activity and enforcing strict browser security policies (e.g., Content Security Policy) can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68dd8fe35b743f3e8e9287c2

Added to database: 10/1/2025, 8:32:35 PM

Last enriched: 10/18/2025, 3:46:36 AM

Last updated: 11/12/2025, 6:55:17 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats