CVE-2026-32721: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openwrt luci
LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b.
AI Analysis
Technical Summary
CVE-2026-32721 is a stored cross-site scripting (XSS) vulnerability identified in the LuCI configuration interface of OpenWrt, specifically affecting versions prior to 26.072.65753~068150b. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Within the wireless scan modal, SSID values obtained from Wi-Fi scan results are directly injected into the DOM using innerHTML via a template literal in the wireless.js file of the luci-mod-network package. Because these SSIDs are not sanitized, an attacker can craft a malicious SSID containing arbitrary HTML or JavaScript code. When a user opens the wireless scan modal to view or connect to Wi-Fi networks, the malicious payload executes in the context of the LuCI web interface. This can lead to theft of sensitive information, session hijacking, or further compromise of the device. Exploitation requires local network proximity to broadcast the malicious SSID and user interaction to open the scan modal. The vulnerability affects OpenWrt versions newer than 23.05/22.03 up to but not including 26.072.65753~068150b, with the fix implemented in that version. The CVSS v3.1 score is 8.6 (High), reflecting local attack vector, low complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The vulnerability enables an attacker to execute arbitrary JavaScript in the context of the LuCI web interface, potentially leading to full compromise of the device's management interface. This could allow attackers to steal administrative credentials, manipulate router configurations, install persistent backdoors, or disrupt network availability. Since OpenWrt is widely used in embedded devices and routers, exploitation could affect home users, enterprises, and service providers relying on these devices for network management. The requirement for user interaction (opening the wireless scan modal) and local network proximity limits remote exploitation but does not eliminate risk in environments where attackers can broadcast malicious SSIDs, such as public Wi-Fi hotspots or compromised internal networks. The scope includes all affected OpenWrt devices running vulnerable LuCI versions, which may be significant given OpenWrt's popularity in various regions. The high CVSS score indicates a serious threat to confidentiality, integrity, and availability.
Mitigation Recommendations
Administrators should immediately upgrade affected OpenWrt devices to LuCI version 26.072.65753~068150b or later, where the vulnerability is patched. If upgrading is not immediately possible, network administrators should restrict access to the LuCI interface to trusted networks only and disable wireless scanning features that trigger the vulnerable code path. Implement network segmentation to isolate management interfaces from untrusted wireless networks. Users should be educated to avoid opening the wireless scan modal in untrusted environments. Additionally, monitoring for unusual SSIDs and logging access to the LuCI interface can help detect potential exploitation attempts. Applying Content Security Policy (CSP) headers on the LuCI interface could provide an additional layer of defense against XSS exploitation. Vendors and integrators should review their firmware builds to ensure the patched LuCI version is included in future releases.
Affected Countries
United States, Germany, China, India, Brazil, Russia, France, United Kingdom, Japan, South Korea
CVE-2026-32721: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openwrt luci
Description
LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32721 is a stored cross-site scripting (XSS) vulnerability identified in the LuCI configuration interface of OpenWrt, specifically affecting versions prior to 26.072.65753~068150b. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Within the wireless scan modal, SSID values obtained from Wi-Fi scan results are directly injected into the DOM using innerHTML via a template literal in the wireless.js file of the luci-mod-network package. Because these SSIDs are not sanitized, an attacker can craft a malicious SSID containing arbitrary HTML or JavaScript code. When a user opens the wireless scan modal to view or connect to Wi-Fi networks, the malicious payload executes in the context of the LuCI web interface. This can lead to theft of sensitive information, session hijacking, or further compromise of the device. Exploitation requires local network proximity to broadcast the malicious SSID and user interaction to open the scan modal. The vulnerability affects OpenWrt versions newer than 23.05/22.03 up to but not including 26.072.65753~068150b, with the fix implemented in that version. The CVSS v3.1 score is 8.6 (High), reflecting local attack vector, low complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The vulnerability enables an attacker to execute arbitrary JavaScript in the context of the LuCI web interface, potentially leading to full compromise of the device's management interface. This could allow attackers to steal administrative credentials, manipulate router configurations, install persistent backdoors, or disrupt network availability. Since OpenWrt is widely used in embedded devices and routers, exploitation could affect home users, enterprises, and service providers relying on these devices for network management. The requirement for user interaction (opening the wireless scan modal) and local network proximity limits remote exploitation but does not eliminate risk in environments where attackers can broadcast malicious SSIDs, such as public Wi-Fi hotspots or compromised internal networks. The scope includes all affected OpenWrt devices running vulnerable LuCI versions, which may be significant given OpenWrt's popularity in various regions. The high CVSS score indicates a serious threat to confidentiality, integrity, and availability.
Mitigation Recommendations
Administrators should immediately upgrade affected OpenWrt devices to LuCI version 26.072.65753~068150b or later, where the vulnerability is patched. If upgrading is not immediately possible, network administrators should restrict access to the LuCI interface to trusted networks only and disable wireless scanning features that trigger the vulnerable code path. Implement network segmentation to isolate management interfaces from untrusted wireless networks. Users should be educated to avoid opening the wireless scan modal in untrusted environments. Additionally, monitoring for unusual SSIDs and logging access to the LuCI interface can help detect potential exploitation attempts. Applying Content Security Policy (CSP) headers on the LuCI interface could provide an additional layer of defense against XSS exploitation. Vendors and integrators should review their firmware builds to ensure the patched LuCI version is included in future releases.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T15:02:00.625Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bc8223e32a4fbe5f062179
Added to database: 3/19/2026, 11:09:23 PM
Last enriched: 3/27/2026, 6:55:40 PM
Last updated: 5/2/2026, 10:48:15 PM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.