Vulnerability Description
In IQrouter through 3.3.1, the Lua function reset_password in the web-panel allows remote attackers to change the root password arbitrarily. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Evenroute | Iqrouter Firmware | <= 3.3.1 |
| Evenroute | Iqrouter | - |
Related Weaknesses (CWE)
References
- https://evenroute.com/Product
- https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-
- https://openwrt.org/docs/guide-quick-start/walkthrough_login
- https://pastebin.com/grSCSBSuThird Party Advisory
- https://evenroute.com/Product
- https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-
- https://openwrt.org/docs/guide-quick-start/walkthrough_login
- https://pastebin.com/grSCSBSuThird Party Advisory
FAQ
What is CVE-2020-11966?
CVE-2020-11966 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In IQrouter through 3.3.1, the Lua function reset_password in the web-panel allows remote attackers to change the root password arbitrarily. Note: The vendor claims that this vulnerability can only oc...
How severe is CVE-2020-11966?
CVE-2020-11966 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-11966?
Check the references section above for vendor advisories and patch information. Affected products include: Evenroute Iqrouter Firmware, Evenroute Iqrouter.