CVE-2025-57389: n/a
A reflected cross-site scripted (XSS) vulnerability in the /admin/system/packages endpoint of Luci OpenWRT v18.06.2 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload.
AI Analysis
Technical Summary
CVE-2025-57389 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the /admin/system/packages endpoint of Luci OpenWRT version 18.06.2. OpenWRT is a widely used open-source Linux-based operating system primarily deployed on embedded devices such as routers. The Luci web interface provides administrative access to OpenWRT devices. This vulnerability allows an attacker to inject and execute arbitrary JavaScript code in the context of a victim user's browser when they access a specially crafted URL or payload targeting the vulnerable endpoint. Because it is a reflected XSS, the malicious script is not stored on the server but reflected off the vulnerable endpoint in the HTTP response. Successful exploitation requires the victim to interact with the crafted link, which could be delivered via phishing emails, malicious websites, or other social engineering methods. The arbitrary JavaScript execution can lead to session hijacking, credential theft, unauthorized actions on behalf of the user, or further exploitation of the victim's browser environment. The vulnerability affects the administrative interface, which is typically accessible only to authenticated users or users on the local network, limiting the attack surface to some extent. However, many OpenWRT devices have exposed administrative interfaces due to misconfigurations or remote management enabled, increasing risk. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. There is no information about patches or fixed versions, so affected users should assume the vulnerability is present in version 18.06.2 and take immediate mitigation steps.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to enterprises, ISPs, and critical infrastructure operators that rely on OpenWRT-based devices for network routing and management. Exploitation could lead to compromise of administrative sessions, allowing attackers to manipulate device configurations, intercept or redirect network traffic, or pivot into internal networks. This could result in data breaches, disruption of network services, or facilitation of further attacks such as malware deployment or lateral movement. The impact is heightened in environments where administrative interfaces are exposed externally or where users have elevated privileges. Given the widespread use of OpenWRT in small office/home office (SOHO) and enterprise-grade routers across Europe, the vulnerability could affect a broad range of organizations. Additionally, the ability to execute arbitrary scripts in a browser context could be leveraged to target specific users within organizations, potentially enabling espionage or sabotage. The lack of a patch increases the urgency for temporary mitigations to reduce exposure.
Mitigation Recommendations
1. Immediately restrict access to the Luci administrative interface by implementing network-level controls such as firewall rules to limit access to trusted IP addresses or VPN-only access. 2. Disable remote administration features on OpenWRT devices unless absolutely necessary. 3. Educate users and administrators to avoid clicking on suspicious links or opening untrusted emails that could deliver the malicious payload. 4. Monitor network traffic and device logs for unusual access patterns or attempts to access the /admin/system/packages endpoint with suspicious parameters. 5. Where possible, upgrade to a newer, patched version of OpenWRT or Luci once available. If no patch is currently available, consider applying custom input validation or web application firewall (WAF) rules to detect and block reflected XSS payloads targeting this endpoint. 6. Employ browser security features such as Content Security Policy (CSP) to limit the impact of injected scripts. 7. Regularly audit device configurations to ensure administrative interfaces are not exposed unnecessarily and that strong authentication mechanisms are in place.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-57389: n/a
Description
A reflected cross-site scripted (XSS) vulnerability in the /admin/system/packages endpoint of Luci OpenWRT v18.06.2 allows attackers to execute arbitrary Javascript in the context of a user's browser via a crafted payload.
AI-Powered Analysis
Technical Analysis
CVE-2025-57389 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the /admin/system/packages endpoint of Luci OpenWRT version 18.06.2. OpenWRT is a widely used open-source Linux-based operating system primarily deployed on embedded devices such as routers. The Luci web interface provides administrative access to OpenWRT devices. This vulnerability allows an attacker to inject and execute arbitrary JavaScript code in the context of a victim user's browser when they access a specially crafted URL or payload targeting the vulnerable endpoint. Because it is a reflected XSS, the malicious script is not stored on the server but reflected off the vulnerable endpoint in the HTTP response. Successful exploitation requires the victim to interact with the crafted link, which could be delivered via phishing emails, malicious websites, or other social engineering methods. The arbitrary JavaScript execution can lead to session hijacking, credential theft, unauthorized actions on behalf of the user, or further exploitation of the victim's browser environment. The vulnerability affects the administrative interface, which is typically accessible only to authenticated users or users on the local network, limiting the attack surface to some extent. However, many OpenWRT devices have exposed administrative interfaces due to misconfigurations or remote management enabled, increasing risk. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. There is no information about patches or fixed versions, so affected users should assume the vulnerability is present in version 18.06.2 and take immediate mitigation steps.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to enterprises, ISPs, and critical infrastructure operators that rely on OpenWRT-based devices for network routing and management. Exploitation could lead to compromise of administrative sessions, allowing attackers to manipulate device configurations, intercept or redirect network traffic, or pivot into internal networks. This could result in data breaches, disruption of network services, or facilitation of further attacks such as malware deployment or lateral movement. The impact is heightened in environments where administrative interfaces are exposed externally or where users have elevated privileges. Given the widespread use of OpenWRT in small office/home office (SOHO) and enterprise-grade routers across Europe, the vulnerability could affect a broad range of organizations. Additionally, the ability to execute arbitrary scripts in a browser context could be leveraged to target specific users within organizations, potentially enabling espionage or sabotage. The lack of a patch increases the urgency for temporary mitigations to reduce exposure.
Mitigation Recommendations
1. Immediately restrict access to the Luci administrative interface by implementing network-level controls such as firewall rules to limit access to trusted IP addresses or VPN-only access. 2. Disable remote administration features on OpenWRT devices unless absolutely necessary. 3. Educate users and administrators to avoid clicking on suspicious links or opening untrusted emails that could deliver the malicious payload. 4. Monitor network traffic and device logs for unusual access patterns or attempts to access the /admin/system/packages endpoint with suspicious parameters. 5. Where possible, upgrade to a newer, patched version of OpenWRT or Luci once available. If no patch is currently available, consider applying custom input validation or web application firewall (WAF) rules to detect and block reflected XSS payloads targeting this endpoint. 6. Employ browser security features such as Content Security Policy (CSP) to limit the impact of injected scripts. 7. Regularly audit device configurations to ensure administrative interfaces are not exposed unnecessarily and that strong authentication mechanisms are in place.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68dd8fe35b743f3e8e9287c2
Added to database: 10/1/2025, 8:32:35 PM
Last enriched: 10/1/2025, 8:33:05 PM
Last updated: 10/1/2025, 8:33:05 PM
Views: 2
Related Threats
CVE-2025-61587: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in WeblateOrg weblate
LowCVE-2025-59951: CWE-348: Use of Less Trusted Source in LukeGus Termix
CriticalCVE-2025-23355: CWE-427 Uncontrolled Search Path Element in NVIDIA Nsight Graphics
MediumCVE-2025-23297: CWE-276 Incorrect Default Permissions in NVIDIA NVIDIA App
HighCVE-2025-59538: CWE-248: Uncaught Exception in argoproj argo-cd
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.