CVE-2026-32721: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openwrt luci
LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b.
AI Analysis
Technical Summary
CVE-2026-32721 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the LuCI web interface component of OpenWrt, a widely used open-source router firmware. The vulnerability arises from improper neutralization of input during web page generation, specifically in the wireless scan modal feature. When a user opens this modal to scan for nearby Wi-Fi networks, the SSID values from scan results are passed through a JavaScript template literal to the DOM via innerHTML without any sanitization or encoding. Because innerHTML processes the SSID as raw HTML, an attacker can craft a malicious SSID containing arbitrary HTML or JavaScript code. When the vulnerable modal is opened, this code executes in the context of the LuCI web interface, potentially allowing an attacker to steal session cookies, perform actions on behalf of the user, or pivot to other internal systems. Exploitation requires the victim to actively open the wireless scan modal, which means user interaction is necessary. The vulnerability affects OpenWrt versions newer than 23.05/22.03 up to versions before 26.072.65753~068150b, with the fix implemented in LuCI 26.072.65753~068150b. The CVSS 3.1 base score is 8.6, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits in the wild have been reported yet.
Potential Impact
The vulnerability poses a significant risk to organizations using OpenWrt devices with the vulnerable LuCI interface, especially in environments where the wireless scan modal is accessed frequently. Successful exploitation can lead to full compromise of the LuCI web session, allowing attackers to execute arbitrary JavaScript, steal credentials or session tokens, manipulate router configurations, or launch further attacks within the internal network. This can result in loss of confidentiality, integrity, and availability of network infrastructure. Since OpenWrt is popular in enterprise, ISP, and industrial settings, the impact can extend to critical network management systems. The requirement for user interaction and local access somewhat limits remote exploitation, but social engineering or insider threats could facilitate attacks. The vulnerability also undermines trust in network device management interfaces, potentially leading to broader security incidents if exploited at scale.
Mitigation Recommendations
Organizations should immediately upgrade affected OpenWrt devices to LuCI version 26.072.65753~068150b or later, where the vulnerability is patched. Until updates can be applied, restrict access to the LuCI web interface by limiting it to trusted management networks or VPNs, and disable wireless scanning features if not required. Implement network segmentation to isolate management interfaces from general user networks. Educate users and administrators about the risks of opening the wireless scan modal and encourage cautious behavior. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) to monitor for suspicious activity related to malformed SSIDs or XSS payloads. Regularly audit router firmware versions and configurations to ensure compliance with security best practices. Finally, consider additional hardening of router management interfaces by enforcing strong authentication and using HTTPS to protect session confidentiality.
Affected Countries
United States, Germany, China, Japan, South Korea, France, United Kingdom, India, Brazil, Russia, Australia, Canada
CVE-2026-32721: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in openwrt luci
Description
LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b.
AI-Powered Analysis
Technical Analysis
CVE-2026-32721 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the LuCI web interface component of OpenWrt, a widely used open-source router firmware. The vulnerability arises from improper neutralization of input during web page generation, specifically in the wireless scan modal feature. When a user opens this modal to scan for nearby Wi-Fi networks, the SSID values from scan results are passed through a JavaScript template literal to the DOM via innerHTML without any sanitization or encoding. Because innerHTML processes the SSID as raw HTML, an attacker can craft a malicious SSID containing arbitrary HTML or JavaScript code. When the vulnerable modal is opened, this code executes in the context of the LuCI web interface, potentially allowing an attacker to steal session cookies, perform actions on behalf of the user, or pivot to other internal systems. Exploitation requires the victim to actively open the wireless scan modal, which means user interaction is necessary. The vulnerability affects OpenWrt versions newer than 23.05/22.03 up to versions before 26.072.65753~068150b, with the fix implemented in LuCI 26.072.65753~068150b. The CVSS 3.1 base score is 8.6, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits in the wild have been reported yet.
Potential Impact
The vulnerability poses a significant risk to organizations using OpenWrt devices with the vulnerable LuCI interface, especially in environments where the wireless scan modal is accessed frequently. Successful exploitation can lead to full compromise of the LuCI web session, allowing attackers to execute arbitrary JavaScript, steal credentials or session tokens, manipulate router configurations, or launch further attacks within the internal network. This can result in loss of confidentiality, integrity, and availability of network infrastructure. Since OpenWrt is popular in enterprise, ISP, and industrial settings, the impact can extend to critical network management systems. The requirement for user interaction and local access somewhat limits remote exploitation, but social engineering or insider threats could facilitate attacks. The vulnerability also undermines trust in network device management interfaces, potentially leading to broader security incidents if exploited at scale.
Mitigation Recommendations
Organizations should immediately upgrade affected OpenWrt devices to LuCI version 26.072.65753~068150b or later, where the vulnerability is patched. Until updates can be applied, restrict access to the LuCI web interface by limiting it to trusted management networks or VPNs, and disable wireless scanning features if not required. Implement network segmentation to isolate management interfaces from general user networks. Educate users and administrators about the risks of opening the wireless scan modal and encourage cautious behavior. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) to monitor for suspicious activity related to malformed SSIDs or XSS payloads. Regularly audit router firmware versions and configurations to ensure compliance with security best practices. Finally, consider additional hardening of router management interfaces by enforcing strong authentication and using HTTPS to protect session confidentiality.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T15:02:00.625Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bc8223e32a4fbe5f062179
Added to database: 3/19/2026, 11:09:23 PM
Last enriched: 3/19/2026, 11:23:40 PM
Last updated: 3/20/2026, 2:06:57 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.