Vulnerabilities (CVE)

Filtered by vendor Openwrt Subscribe
Total 93 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-45906 1 Openwrt 1 Openwrt 2023-05-24 3.5 LOW 5.4 MEDIUM
OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen.
CVE-2020-7248 1 Openwrt 1 Openwrt 2023-05-24 5.0 MEDIUM 7.5 HIGH
libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.
CVE-2019-18992 1 Openwrt 1 Openwrt 2023-05-24 3.5 LOW 5.4 MEDIUM
OpenWrt 18.06.4 allows XSS via these Name fields to the cgi-bin/luci/admin/network/firewall/rules URI: "Open ports on router" and "New forward rule" and "New Source NAT" (this can occur, for example, on a TP-Link Archer C7 device).
CVE-2021-28961 1 Openwrt 1 Openwrt 2023-05-24 6.5 MEDIUM 8.8 HIGH
applications/luci-app-ddns/luasrc/model/cbi/ddns/detail.lua in the DDNS package for OpenWrt 19.07 allows remote authenticated users to inject arbitrary commands via POST requests.
CVE-2021-22161 1 Openwrt 1 Openwrt 2023-05-24 3.3 LOW 6.5 MEDIUM
In OpenWrt 19.07.x before 19.07.7, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. This affects the netifd and odhcp6c packages.
CVE-2019-19945 1 Openwrt 1 Openwrt 2023-05-24 5.0 MEDIUM 7.5 HIGH
uhttpd in OpenWrt through 18.06.5 and 19.x through 19.07.0-rc2 has an integer signedness error. This leads to out-of-bounds access to a heap buffer and a subsequent crash. It can be triggered with an HTTP POST request to a CGI script, specifying both "Transfer-Encoding: chunked" and a large negative Content-Length value.
CVE-2019-18993 1 Openwrt 1 Openwrt 2023-05-24 3.5 LOW 5.4 MEDIUM
OpenWrt 18.06.4 allows XSS via the "New port forward" Name field to the cgi-bin/luci/admin/network/firewall/forwards URI (this can occur, for example, on a TP-Link Archer C7 device).
CVE-2020-7982 1 Openwrt 2 Lede, Openwrt 2023-05-24 6.8 MEDIUM 8.1 HIGH
An issue was discovered in OpenWrt 18.06.0 to 18.06.6 and 19.07.0, and LEDE 17.01.0 to 17.01.7. A bug in the fork of the opkg package manager before 2020-01-25 prevents correct parsing of embedded checksums in the signed repository index, allowing a man-in-the-middle attacker to inject arbitrary package payloads (which are installed without verification).
CVE-2021-45904 1 Openwrt 1 Openwrt 2023-05-24 3.5 LOW 5.4 MEDIUM
OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen.
CVE-2021-27821 1 Openwrt 1 Luci 2021-06-03 4.3 MEDIUM 6.1 MEDIUM
The Web Interface for OpenWRT LuCI version 19.07 and lower has been discovered to have a cross-site scripting vulnerability which can lead to attackers carrying out arbitrary code execution.
CVE-2019-12272 1 Openwrt 1 Luci 2020-08-24 7.5 HIGH 9.8 CRITICAL
In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability.
CVE-2019-17367 1 Openwrt 1 Openwrt 2019-10-22 6.8 MEDIUM 8.8 HIGH
OpenWRT firmware version 18.06.4 is vulnerable to CSRF via wireless/radio0.network1, wireless/radio1.network1, firewall, firewall/zones, firewall/forwards, firewall/rules, network/wan, network/wan6, or network/lan under /cgi-bin/luci/admin/network/.
CVE-2018-19630 1 Openwrt 2 Lede, Openwrt 2018-12-31 4.3 MEDIUM 6.1 MEDIUM
cgi_handle_request in uhttpd in OpenWrt through 18.06.1 and LEDE through 17.01 has unauthenticated reflected XSS via the URI, as demonstrated by a cgi-bin/?[XSS] URI.