CVE-2020-11968
HIGHEvenroute Iqrouter Firmware < 3.3.1 - Log Information Exposure
Title source: ruleDescription
In the web-panel in IQrouter through 3.3.1, remote attackers can read system logs because of Incorrect Access Control. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
References (4)
Core 4
Core References
Product x_refsource_misc
https://evenroute.com/
Third Party Advisory x_refsource_misc
https://pastebin.com/grSCSBSu
Various Sources x_refsource_misc
https://openwrt.org/docs/guide-quick-start/walkthrough_login
Various Sources x_refsource_misc
https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-
Scores
CVSS v3
7.5
EPSS
0.0069
EPSS Percentile
71.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-532
Status
published
Products (1)
evenroute/iqrouter_firmware
< 3.3.1
Published
Apr 21, 2020
Tracked Since
Feb 18, 2026