Summary
OpenWrt released versions 25.12.1 and 24.10.6 to patch critical stack buffer overflows in the mdnsd daemon and a high-severity XSS flaw in the WiFi scan interface. These vulnerabilities allow unauthenticated remote code execution and unauthorized browser-based attacks against router administrators.
Take Action:
If you are using OpenWrt, plan a quick update to block remote code execution via the DNS daemon. Until you update, disable multicast DNS or restrict access to the UDP 5353 interface to mitigate exploitation. And of course, make sure the Web admin interface is only accessible from trusted networks.
Read the full article on BeyondMachines
This article was originally published on BeyondMachines
Top comments (0)