### [CVE-2020-7982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7982) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in OpenWrt 18.06.0 to 18.06.6 and 19.07.0, and LEDE 17.01.0 to 17.01.7. A bug in the fork of the opkg package manager before 2020-01-25 prevents correct parsing of embedded checksums in the signed repository index, allowing a man-in-the-middle attacker to inject arbitrary package payloads (which are installed without verification). ### POC #### Reference - https://blog.forallsecure.com/uncovering-openwrt-remote-code-execution-cve-2020-7982 - https://github.com/openwrt/openwrt/commits/master #### Github - https://github.com/BloodyOrangeMan/DVRF