When you connect to a Wifi, network manager stores all connection details inside /rw/config/NM-system-connections/[wifi].nmconnection.
Just copy that file to the hopefully dedicated template of your disposable sys-net and your disposable sys-net will work with it on next boot.
The same applies for all the other modifications that need to remain persistent. Do them inside the template. You can see from mount what is persistent in your template (everything on /dev/xvdb).
If the network card firmware is compromised could it potentially give the attacker access to other VMs, such as vaults that are not connected to sys-net?
Following XSA-404, I did sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing which installed the qubes-core-dom0-linux-4.1.23 package. Then cpu-microcode-info revealed that I have the 2022-05 update installed.
It would be very helpful to know: Was this update installed after I did the dom0 update, or does this mean it was already updated by some other process?
The XSA seems to say that the updated package qubes-core-dom0-linux-4.1.23 is only providing information, not new microcode.
(If you have copied anything else to this qube, or if you only want to copy one or two network configs, replace those stars with something more accurate)
Before doing any of this, make sure you are OK with broadcasting those SSIDs (and maybe passwords?!?) as alzer mentioned.
Also donāt forget to make the .nmconnection files in then /rw/config/NM-system-connections/ folder to have the user root and group root as the owner:
Well now we have a working process to save wifi passwords (and persist network info) across reboots of a disposable (sys-)net qube. Just use @bayesian 's path and not mine in the disposable template (for me, fedora-36-dvm).