← Volver a CVEs
CVE-2020-11965
CRITICAL9.8
Descripcion
In IQrouter through 3.3.1, there is a root user without a password, which allows attackers to gain full remote access via SSH. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado4/21/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
evenroute:iqrouterevenroute:iqrouter_firmware
Debilidades (CWE)
CWE-287
Referencias
https://evenroute.com/(cve@mitre.org)
https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-(cve@mitre.org)
https://openwrt.org/docs/guide-quick-start/walkthrough_login(cve@mitre.org)
https://pastebin.com/grSCSBSu(cve@mitre.org)
https://evenroute.com/(af854a3a-2127-422b-91ae-364da2661108)
https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-(af854a3a-2127-422b-91ae-364da2661108)
https://openwrt.org/docs/guide-quick-start/walkthrough_login(af854a3a-2127-422b-91ae-364da2661108)
https://pastebin.com/grSCSBSu(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.