Openwrt

Openwrt

91 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.34%
  • Veröffentlicht 26.01.2021 18:15:31
  • Zuletzt bearbeitet 21.11.2024 04:39:44

LuCI in OpenWrt 18.06.0 through 18.06.4 allows stored XSS via a crafted SSID.

  • EPSS 0.52%
  • Veröffentlicht 19.11.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:23:22

libuci in OpenWrt before 18.06.9 and 19.x before 19.07.5 may encounter a use after free when using malicious package names. This is related to uci_parse_package in file.c and uci_strdup in util.c.

Medienbericht Exploit
  • EPSS 4.37%
  • Veröffentlicht 16.03.2020 22:15:14
  • Zuletzt bearbeitet 21.11.2024 05:38:08

An issue was discovered in OpenWrt 18.06.0 to 18.06.6 and 19.07.0, and LEDE 17.01.0 to 17.01.7. A bug in the fork of the opkg package manager before 2020-01-25 prevents correct parsing of embedded checksums in the signed repository index, allowing a ...

  • EPSS 1.11%
  • Veröffentlicht 16.03.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:36:55

libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.

  • EPSS 0.98%
  • Veröffentlicht 16.03.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:42

uhttpd in OpenWrt through 18.06.5 and 19.x through 19.07.0-rc2 has an integer signedness error. This leads to out-of-bounds access to a heap buffer and a subsequent crash. It can be triggered with an HTTP POST request to a CGI script, specifying both...

  • EPSS 0.28%
  • Veröffentlicht 03.12.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:57

OpenWrt 18.06.4 allows XSS via the "New port forward" Name field to the cgi-bin/luci/admin/network/firewall/forwards URI (this can occur, for example, on a TP-Link Archer C7 device).

  • EPSS 0.28%
  • Veröffentlicht 03.12.2019 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:57

OpenWrt 18.06.4 allows XSS via these Name fields to the cgi-bin/luci/admin/network/firewall/rules URI: "Open ports on router" and "New forward rule" and "New Source NAT" (this can occur, for example, on a TP-Link Archer C7 device).

Exploit
  • EPSS 0.22%
  • Veröffentlicht 18.11.2019 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:44:21

An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is inval...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 18.11.2019 18:15:09
  • Zuletzt bearbeitet 21.11.2024 04:44:21

An exploitable information leak vulnerability exists in the ustream-ssl library of OpenWrt, versions 18.06.4 and 15.05.1. When connecting to a remote server, the server's SSL certificate is checked but no action is taken when the certificate is inval...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 28.11.2018 10:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:19

cgi_handle_request in uhttpd in OpenWrt through 18.06.1 and LEDE through 17.01 has unauthenticated reflected XSS via the URI, as demonstrated by a cgi-bin/?[XSS] URI.