CVE-2020-11963

9.8 CRITICAL

📋 TL;DR

CVE-2020-11963 allows remote code execution via Bash shell metacharacter injection in the IQrouter web panel when the device is unconfigured. This affects IQrouter devices running OpenWRT-based firmware up to version 3.3.1 that haven't completed initial configuration. The vendor claims this vulnerability only exists during the brief unconfigured state before mandatory secure password setup.

💻 Affected Systems

Products:
  • IQrouter
Versions: through 3.3.1
Operating Systems: OpenWRT-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when device is unconfigured (brand-new or factory reset). Vulnerability disappears after completing mandatory initial configuration with secure password.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands as root, install backdoors, pivot to internal networks, and permanently compromise the router.

🟠

Likely Case

Limited exploitation window during initial setup phase, but successful exploitation would give full control over the router before proper security configuration.

🟢

If Mitigated

No impact if device has completed initial configuration with secure password, as the vulnerable state only exists during first-time setup.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details available in public pastebin. Metacharacter injection allows command execution without authentication during unconfigured state.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://evenroute.zendesk.com/hc/en-us/articles/216107838-How-do-I-configure-an-IQrouter-

Restart Required: No

Instructions:

Complete initial configuration immediately after device setup. Follow vendor guide to set secure password during mandatory configuration wizard.

🔧 Temporary Workarounds

Immediate Initial Configuration

all

Complete the mandatory configuration wizard immediately upon device setup to eliminate vulnerable state

Follow web interface configuration wizard at first boot

Network Isolation During Setup

all

Configure device in isolated network environment before deployment

🧯 If You Can't Patch

  • Ensure device completes initial configuration before connecting to production network
  • Monitor for factory reset events and reconfigure immediately if detected

🔍 How to Verify

Check if Vulnerable:

Check if device shows unconfigured state in web interface or if initial configuration wizard is still accessible without authentication

Check Version:

Check web interface admin panel for firmware version or use SSH: cat /etc/version

Verify Fix Applied:

Verify that initial configuration is complete and secure password is set. Attempt to access configuration wizard should require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to configuration endpoints
  • Shell command execution from web interface processes
  • Factory reset events in system logs

Network Indicators:

  • HTTP requests to configuration endpoints without authentication
  • Unusual outbound connections from router shortly after setup

SIEM Query:

source="iqrouter" AND (event="unauthenticated_access" OR event="factory_reset")

🔗 References

📤 Share & Export