Vulnerability Description
OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwrt | Openwrt | - |
Related Weaknesses (CWE)
References
- http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.htmlThird Party Advisory
- https://forum.openwrt.org/t/rpcd-vulnerability-reported-on-vultdb/16497/3
- http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.htmlThird Party Advisory
- https://forum.openwrt.org/t/rpcd-vulnerability-reported-on-vultdb/16497/3
FAQ
What is CVE-2018-11116?
CVE-2018-11116 is a vulnerability with a CVSS score of 8.8 (HIGH). OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that ...
How severe is CVE-2018-11116?
CVE-2018-11116 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11116?
Check the references section above for vendor advisories and patch information. Affected products include: Openwrt Openwrt.