CVE-2020-11963
📋 TL;DR
CVE-2020-11963 allows remote code execution via Bash shell metacharacter injection in the IQrouter web panel when the device is unconfigured. This affects IQrouter devices running OpenWRT-based firmware up to version 3.3.1 that haven't completed initial configuration. The vendor claims this vulnerability only exists during the brief unconfigured state before mandatory secure password setup.
💻 Affected Systems
- IQrouter
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary commands as root, install backdoors, pivot to internal networks, and permanently compromise the router.
Likely Case
Limited exploitation window during initial setup phase, but successful exploitation would give full control over the router before proper security configuration.
If Mitigated
No impact if device has completed initial configuration with secure password, as the vulnerable state only exists during first-time setup.
🎯 Exploit Status
Exploit details available in public pastebin. Metacharacter injection allows command execution without authentication during unconfigured state.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-
Restart Required: No
Instructions:
Complete initial configuration immediately after device setup. Follow vendor guide to set secure password during mandatory configuration wizard.
🔧 Temporary Workarounds
Immediate Initial Configuration
allComplete the mandatory configuration wizard immediately upon device setup to eliminate vulnerable state
Follow web interface configuration wizard at first boot
Network Isolation During Setup
allConfigure device in isolated network environment before deployment
🧯 If You Can't Patch
- Ensure device completes initial configuration before connecting to production network
- Monitor for factory reset events and reconfigure immediately if detected
🔍 How to Verify
Check if Vulnerable:
Check if device shows unconfigured state in web interface or if initial configuration wizard is still accessible without authentication
Check Version:
Check web interface admin panel for firmware version or use SSH: cat /etc/version
Verify Fix Applied:
Verify that initial configuration is complete and secure password is set. Attempt to access configuration wizard should require authentication.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access attempts to configuration endpoints
- Shell command execution from web interface processes
- Factory reset events in system logs
Network Indicators:
- HTTP requests to configuration endpoints without authentication
- Unusual outbound connections from router shortly after setup
SIEM Query:
source="iqrouter" AND (event="unauthenticated_access" OR event="factory_reset")
🔗 References
- https://evenroute.com/
- https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-
- https://openwrt.org/docs/guide-quick-start/walkthrough_login
- https://pastebin.com/grSCSBSu
- https://evenroute.com/
- https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-
- https://openwrt.org/docs/guide-quick-start/walkthrough_login
- https://pastebin.com/grSCSBSu