In IQrouter through 3.3.1, there is a root user without a password, which allows attackers to gain full remote access via SSH. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
References
Link | Resource |
---|---|
https://evenroute.com/ | Product |
https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter- | Third Party Advisory |
https://openwrt.org/docs/guide-quick-start/walkthrough_login | Third Party Advisory |
https://pastebin.com/grSCSBSu | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2020-04-21 13:15
Updated : 2024-05-17 01:41
NVD link : CVE-2020-11965
Mitre link : CVE-2020-11965
CVE.ORG link : CVE-2020-11965
JSON object : View
Products Affected
evenroute
- iqrouter
- iqrouter_firmware
CWE
CWE-287
Improper Authentication