Openwrt

Openwrt

124 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 15.05.2023 22:15:11
  • Zuletzt bearbeitet 24.01.2025 15:15:09

In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS077359...

  • EPSS 0.01%
  • Veröffentlicht 15.05.2023 22:15:10
  • Zuletzt bearbeitet 23.01.2025 22:15:09

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07733998 / A...

  • EPSS 0.01%
  • Veröffentlicht 15.05.2023 22:15:10
  • Zuletzt bearbeitet 23.01.2025 22:15:10

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / A...

  • EPSS 0.01%
  • Veröffentlicht 15.05.2023 22:15:10
  • Zuletzt bearbeitet 23.01.2025 22:15:10

In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07856356 / A...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 11.04.2023 01:15:07
  • Zuletzt bearbeitet 11.02.2025 17:15:15

LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /system/sshkeys.js.

  • EPSS 0.64%
  • Veröffentlicht 19.09.2022 17:15:14
  • Zuletzt bearbeitet 21.11.2024 07:16:16

Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 27.12.2021 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:33:14

OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 27.12.2021 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:33:14

OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 27.12.2021 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:33:14

OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen.

  • EPSS 0.22%
  • Veröffentlicht 02.08.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:06:43

There is missing input validation of host names displayed in OpenWrt before 19.07.8. The Connection Status page of the luci web-interface allows XSS, which can be used to gain full control over the affected system via ICMP.