openwrt CVE Vulnerabilities & Metrics

Focus on openwrt vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About openwrt Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with openwrt. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total openwrt CVEs: 53
Earliest CVE date: 19 Jun 2018, 21:29 UTC
Latest CVE date: 03 Feb 2025, 04:15 UTC

Latest CVE reference: CVE-2025-20635

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): -83.33%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): -83.33%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical openwrt CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.19

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 38
4.0-6.9 12
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS openwrt CVEs

These are the five CVEs with the highest CVSS scores for openwrt, sorted by severity first and recency.

All CVEs for openwrt

CVE-2025-20635 openwrt vulnerability CVSS: 0 03 Feb 2025, 04:15 UTC

In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434.

CVE-2024-20085 openwrt vulnerability CVSS: 0 02 Sep 2024, 05:15 UTC

In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560.

CVE-2024-20084 openwrt vulnerability CVSS: 0 02 Sep 2024, 05:15 UTC

In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561.

CVE-2024-20081 openwrt vulnerability CVSS: 0 01 Jul 2024, 05:15 UTC

In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412.

CVE-2024-20022 openwrt vulnerability CVSS: 0 04 Mar 2024, 03:15 UTC

In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.

CVE-2024-20006 openwrt vulnerability CVSS: 0 05 Feb 2024, 06:15 UTC

In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148.

CVE-2023-32855 openwrt vulnerability CVSS: 0 04 Dec 2023, 04:15 UTC

In aee, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07909204; Issue ID: ALPS07909204.

CVE-2023-32815 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801.

CVE-2023-32813 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017370; Issue ID: ALPS08017370.

CVE-2023-32812 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local esclation of privileges with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017365; Issue ID: ALPS08017365.

CVE-2023-32806 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589.

CVE-2023-20832 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530.

CVE-2023-20831 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162.

CVE-2023-20830 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156.

CVE-2023-20829 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148.

CVE-2023-20828 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144.

CVE-2023-20821 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113.

CVE-2023-20820 openwrt vulnerability CVSS: 0 04 Sep 2023, 03:15 UTC

In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.

CVE-2023-20796 openwrt vulnerability CVSS: 0 07 Aug 2023, 04:15 UTC

In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790.

CVE-2023-20790 openwrt vulnerability CVSS: 0 07 Aug 2023, 04:15 UTC

In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.

CVE-2023-20775 openwrt vulnerability CVSS: 0 04 Jul 2023, 02:15 UTC

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.

CVE-2023-20725 openwrt vulnerability CVSS: 0 06 Jun 2023, 13:15 UTC

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only).

CVE-2023-20726 openwrt vulnerability CVSS: 0 15 May 2023, 22:15 UTC

In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).

CVE-2023-20696 openwrt vulnerability CVSS: 0 15 May 2023, 22:15 UTC

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07856356 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07856356 / ALPS07874388 (For MT6880 and MT6890 only).

CVE-2023-20695 openwrt vulnerability CVSS: 0 15 May 2023, 22:15 UTC

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only).

CVE-2023-20694 openwrt vulnerability CVSS: 0 15 May 2023, 22:15 UTC

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only).

CVE-2023-24182 openwrt vulnerability CVSS: 0 11 Apr 2023, 01:15 UTC

LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /system/sshkeys.js.

CVE-2023-24181 openwrt vulnerability CVSS: 0 10 Apr 2023, 14:15 UTC

LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm.

CVE-2022-41435 openwrt vulnerability CVSS: 0 03 Nov 2022, 12:15 UTC

OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments.

CVE-2022-38333 openwrt vulnerability CVSS: 0 19 Sep 2022, 17:15 UTC

Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request.

CVE-2021-45906 openwrt vulnerability CVSS: 3.5 27 Dec 2021, 23:15 UTC

OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen.

CVE-2021-45905 openwrt vulnerability CVSS: 3.5 27 Dec 2021, 23:15 UTC

OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen.

CVE-2021-45904 openwrt vulnerability CVSS: 3.5 27 Dec 2021, 23:15 UTC

OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen.

CVE-2021-32019 openwrt vulnerability CVSS: 4.3 02 Aug 2021, 21:15 UTC

There is missing input validation of host names displayed in OpenWrt before 19.07.8. The Connection Status page of the luci web-interface allows XSS, which can be used to gain full control over the affected system via ICMP.

CVE-2021-33425 openwrt vulnerability CVSS: 3.5 25 May 2021, 14:15 UTC

A stored cross-site scripting (XSS) vulnerability was discovered in the Web Interface for OpenWRT LuCI version 19.07 which allows attackers to inject arbitrary Javascript in the OpenWRT Hostname via the Hostname Change operation.

CVE-2021-27821 openwrt vulnerability CVSS: 4.3 25 May 2021, 14:15 UTC

The Web Interface for OpenWRT LuCI version 19.07 and lower has been discovered to have a cross-site scripting vulnerability which can lead to attackers carrying out arbitrary code execution.

CVE-2021-28961 openwrt vulnerability CVSS: 6.5 21 Mar 2021, 06:15 UTC

applications/luci-app-ddns/luasrc/model/cbi/ddns/detail.lua in the DDNS package for OpenWrt 19.07 allows remote authenticated users to inject arbitrary commands via POST requests.

CVE-2021-22161 openwrt vulnerability CVSS: 3.3 07 Feb 2021, 23:15 UTC

In OpenWrt 19.07.x before 19.07.7, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. This affects the netifd and odhcp6c packages.

CVE-2019-25015 openwrt vulnerability CVSS: 3.5 26 Jan 2021, 18:15 UTC

LuCI in OpenWrt 18.06.0 through 18.06.4 allows stored XSS via a crafted SSID.

CVE-2020-28951 openwrt vulnerability CVSS: 10.0 19 Nov 2020, 19:15 UTC

libuci in OpenWrt before 18.06.9 and 19.x before 19.07.5 may encounter a use after free when using malicious package names. This is related to uci_parse_package in file.c and uci_strdup in util.c.

CVE-2020-10871 openwrt vulnerability CVSS: 5.0 23 Mar 2020, 20:15 UTC

In OpenWrt LuCI git-20.x, remote unauthenticated attackers can retrieve the list of installed packages and services. NOTE: the vendor disputes the significance of this report because, for instances reachable by an unauthenticated actor, the same information is available in other (more complex) ways, and there is no plan to restrict the information further

CVE-2020-7982 openwrt vulnerability CVSS: 6.8 16 Mar 2020, 22:15 UTC

An issue was discovered in OpenWrt 18.06.0 to 18.06.6 and 19.07.0, and LEDE 17.01.0 to 17.01.7. A bug in the fork of the opkg package manager before 2020-01-25 prevents correct parsing of embedded checksums in the signed repository index, allowing a man-in-the-middle attacker to inject arbitrary package payloads (which are installed without verification).

CVE-2020-7248 openwrt vulnerability CVSS: 5.0 16 Mar 2020, 21:15 UTC

libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.

CVE-2019-19945 openwrt vulnerability CVSS: 5.0 16 Mar 2020, 18:15 UTC

uhttpd in OpenWrt through 18.06.5 and 19.x through 19.07.0-rc2 has an integer signedness error. This leads to out-of-bounds access to a heap buffer and a subsequent crash. It can be triggered with an HTTP POST request to a CGI script, specifying both "Transfer-Encoding: chunked" and a large negative Content-Length value.

CVE-2019-18993 openwrt vulnerability CVSS: 3.5 03 Dec 2019, 20:15 UTC

OpenWrt 18.06.4 allows XSS via the "New port forward" Name field to the cgi-bin/luci/admin/network/firewall/forwards URI (this can occur, for example, on a TP-Link Archer C7 device).

CVE-2019-18992 openwrt vulnerability CVSS: 3.5 03 Dec 2019, 20:15 UTC

OpenWrt 18.06.4 allows XSS via these Name fields to the cgi-bin/luci/admin/network/firewall/rules URI: "Open ports on router" and "New forward rule" and "New Source NAT" (this can occur, for example, on a TP-Link Archer C7 device).

CVE-2019-5102 openwrt vulnerability CVSS: 4.3 18 Nov 2019, 18:15 UTC

An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request.An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request.

CVE-2019-5101 openwrt vulnerability CVSS: 4.3 18 Nov 2019, 18:15 UTC

An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request.An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is invalid. An attacker could exploit this behavior by performing a man-in-the-middle attack, providing any certificate, leading to the theft of all the data sent by the client during the first request. After an SSL connection is initialized via _ustream_ssl_init, and after any data (e.g. the client's HTTP request) is written to the stream using ustream_printf, the code eventually enters the function _ustream_ssl_poll, which is used to dispatch the read/write events

CVE-2019-17367 openwrt vulnerability CVSS: 6.8 18 Oct 2019, 17:15 UTC

OpenWRT firmware version 18.06.4 is vulnerable to CSRF via wireless/radio0.network1, wireless/radio1.network1, firewall, firewall/zones, firewall/forwards, firewall/rules, network/wan, network/wan6, or network/lan under /cgi-bin/luci/admin/network/.

CVE-2019-15513 openwrt vulnerability CVSS: 7.8 23 Aug 2019, 07:15 UTC

An issue was discovered in OpenWrt libuci (aka Library for the Unified Configuration Interface) before 15.05.1 as used on Motorola CX2L MWR04L 1.01 and C1 MWR03 1.01 devices. /tmp/.uci/network locking is mishandled after reception of a long SetWanSettings command, leading to a device hang.

CVE-2019-12272 openwrt vulnerability CVSS: 7.5 23 May 2019, 15:30 UTC

In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability.

CVE-2018-19630 openwrt vulnerability CVSS: 4.3 28 Nov 2018, 10:29 UTC

cgi_handle_request in uhttpd in OpenWrt through 18.06.1 and LEDE through 17.01 has unauthenticated reflected XSS via the URI, as demonstrated by a cgi-bin/?[XSS] URI.

CVE-2018-11116 openwrt vulnerability CVSS: 6.5 19 Jun 2018, 21:29 UTC

OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately