CVE-2020-11968

In the web-panel in IQrouter through 3.3.1, remote attackers can read system logs because of Incorrect Access Control. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:evenroute:iqrouter_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:evenroute:iqrouter:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:15

Type Values Removed Values Added
Summary ** DISPUTED ** In the web-panel in IQrouter through 3.3.1, remote attackers can read system logs because of Incorrect Access Control. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”. In the web-panel in IQrouter through 3.3.1, remote attackers can read system logs because of Incorrect Access Control. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”

Information

Published : 2020-04-21 13:15

Updated : 2024-04-11 01:06


NVD link : CVE-2020-11968

Mitre link : CVE-2020-11968

CVE.ORG link : CVE-2020-11968


JSON object : View

Products Affected

evenroute

  • iqrouter_firmware
  • iqrouter
CWE
CWE-532

Insertion of Sensitive Information into Log File