In IQrouter through 3.3.1, remote attackers can control the device (restart network, reboot, upgrade, reset) because of Incorrect Access Control. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://evenroute.com/ - Product | |
References | () https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter- - | |
References | () https://openwrt.org/docs/guide-quick-start/walkthrough_login - | |
References | () https://pastebin.com/grSCSBSu - Third Party Advisory |
07 Nov 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In IQrouter through 3.3.1, remote attackers can control the device (restart network, reboot, upgrade, reset) because of Incorrect Access Control. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time” |
Information
Published : 2020-04-21 13:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-11967
Mitre link : CVE-2020-11967
CVE.ORG link : CVE-2020-11967
JSON object : View
Products Affected
evenroute
- iqrouter_firmware
- iqrouter
CWE
CWE-862
Missing Authorization