CVE-2025-50740
Description
AutoConnect 1.4.2, an Arduino library, is vulnerable to a cross site scripting (xss) vulnerability. The AutoConnect web interface /_ac/config allows HTML/JS code to be executed via a crafted network SSID.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
AutoConnect 1.4.2 Arduino library suffers from stored XSS via SSID in the /_ac/config web interface, allowing adjacent attackers to execute scripts.
The AutoConnect library version 1.4.2 for Arduino contains a cross-site scripting (XSS) vulnerability in its web-based configuration interface. The /_ac/config page displays available Wi-Fi networks and does not properly sanitize the SSID field before rendering it in HTML [1]. An attacker can create a rogue Wi-Fi access point with a malicious SSID containing HTML/JavaScript code, such as ``. When a user accesses the configuration page, the device scans for networks and populates the list, causing the attacker's script to execute in the user's browser [2].
Exploitation requires the attacker to be in Wi-Fi range of the target device. No authentication is needed to access the /_ac/config page, which is intended for device configuration. The attacker sets up a Wi-Fi hotspot with a crafted SSID; any user who opens the configuration page while the rogue network is visible will trigger the script [2]. The script can be crafted to perform further actions like stealing session cookies or redirecting to malicious sites.
Successful exploitation allows an adjacent attacker to execute arbitrary JavaScript in the context of the AutoConnect web interface. This can lead to credential theft, session hijacking, or manipulation of the device's Wi-Fi configuration, potentially forcing the device to connect to an attacker-controlled network [2]. The impact is limited to the browser session but can affect subsequent device interactions.
The vendor has not yet released a patched version, but the recommended remediation is to HTML-encode all SSIDs containing special characters before rendering them in the web interface [2]. Users should avoid opening the configuration page in the presence of untrusted Wi-Fi networks until a fix is applied.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: = 1.4.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.