OpenWrt Access Control Bypass in rpcd Configuration

OpenWrt Access Control Bypass in rpcd Configuration

CVE-2018-11116 · MEDIUM Severity

AV:N/AC:L/AU:S/C:P/I:P/A:P

OpenWrt mishandles access control in /etc/config/rpcd and the /usr/share/rpcd/acl.d files, which allows remote authenticated users to call arbitrary methods (i.e., achieve ubus access over HTTP) that were only supposed to be accessible to a specific user, as demonstrated by the file, log, and service namespaces, potentially leading to remote Information Disclosure or Code Execution. NOTE: The developer disputes this as a vulnerability, indicating that rpcd functions appropriately

Learn more about our User Device Pen Test.