TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Exploit-DB

[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

2026-04-29 · Read original ↗

ATT&CK techniques detected

4 predictions
T1190Exploit Public-Facing Application
87%
"[ local ] openwrt 23. 05 - authenticated remote code execution ( rce ) openwrt 23. 05 - authenticated remote code execution ( rce ) # exploit title : openwrt 23. 05 - authenticated remote code execution ( rce ) # date : 2026 - 01 - 17 # exploit author : ahmet mersin # vendor home…"
T1190Exploit Public-Facing Application
70%
"" id " : 666, " method " : " call ", " params " : [ session _ id, " luci. https - dns - proxy ", " setinitaction ", { " name " : malicious _ name, " action " : " start " } ] } try : r = requests. post ( endpoint, json = payload, timeout = 10 ) response = r. json ( ) print ( f " […"
T1068Exploitation for Privilege Escalation
64%
"dns - proxy root takeover exploit cve - 202x - xxxxx | privilege escalation via command injection developed by : ahmetmersin. com " " " ) def get _ user _ input ( ) : print ( " [ * ] target router information : " ) target _ ip = input ( " router ip [ 192. 168. 1. 1 ] : " ). strip…"
T1190Exploit Public-Facing Application
37%
"dns - proxy root takeover exploit cve - 202x - xxxxx | privilege escalation via command injection developed by : ahmetmersin. com " " " ) def get _ user _ input ( ) : print ( " [ * ] target router information : " ) target _ ip = input ( " router ip [ 192. 168. 1. 1 ] : " ). strip…"

Summary

OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)