A vulnerability in the OpenWrt attended sysupgrade server
For a detailed description of how the exploit works, see this blog post.
Then, as the hash collision occurred, the server returns the overwritten build artifact to the legitimate request that requests the following packages. [...]By abusing this, an attacker could force the user to upgrade to the malicious firmware, which could lead to the compromise of the device.
Posted Dec 10, 2024 22:13 UTC (Tue)
by Lennie (subscriber, #49641)
[Link]
Probably because people think it might be a bad idea, possibly because they don't even want to spend time thinking how much less secure it will make them.
Truncated hash collision ?
