CVE-2020-7982: Opkg vulnerable OpenWrt / LEDE in MITM vulnerability

OpenWrt reveals a security vulnerability (CVE-2020-7982) has been fixed. Hackers can use this vulnerability to trigger remote router management and access permissions.

Of course, now it disclosed the vulnerability, and has been successfully repaired, so users only need to download and upgrade to the latest version of the firmware can successfully fix the vulnerability.

CVE-2020-7982 vulnerability details

A list of error packet parsing logic opkg fork of OpenWrt in that the package manager ignores the signature embedded in the index store a SHA-256 and checksum, thereby effectively bypassing the workpiece downloaded .ipk integrity check.

Because opkg on OpenWrt run as root, and has write access to the entire file system, it is possible to inject arbitrary code via forged .ipk package (with a malicious payload).

According to the official statement of the project team, OpenWrt version includes 18.06.0 to 18.06.6 and 19.07.0 and 17.01.7 LEDE 17.01.0 to be affected.

At the same time, based on LEDE firmware version OpenWrt firmware 17.01.0-17.01.7 also affected, so users need to use LEDE firmware update.

In addition, older versions and unsupported, as OpenWrt 15.05 LEDE 17.01 and are affected by the vulnerability, and can not be repaired.

Guess you like

Origin www.linuxidc.com/Linux/2020-02/162235.htm