OpenWrt Security - Overview

Under Construction!
This page is currently under construction. You can edit the article to help completing it.

This is a draft of a page discussing high-level security issues for OpenWrt. It was captures some of the discussion from the openwrt-devel mailing list messages at IT IS NOT READY FOR PRIME TIME - Please fill in details. Thanks. -Rich

This page is also under construction. Don't even look at it yet as I pull the draft together over the next day or so. Thanks. -Rich

This page gives an overview of the security issues addressed in OpenWrt firmware. For a more detailed developer-level review of OpenWrt Security, see the developer guide at: security

[is this true?] We look to the threat model of EFF OpenWireless project for guidance:

a) An attacker using the public Internet to reach the router directly, trying to gain access to the admin UI or execute code on the router.

b) An attacker running a malicious website on the public Internet, trying to use XSS, CSRF, or similar attacks that use the router admin's logged-in session to change settings in the admin UI.

c) An eavesdropper near the router, trying to read private communications or gain access to the private network.

d) An attacker near the router who knows the private network password, trying to change settings in the admin UI or execute code on the router.

A recent study from CITL ( indicates that vendors of router firmware, “Aren't even trying.” This section describe some of the concerns that their report identifies, and how OpenWrt addresses them.

... more to come...

This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.More information about cookies
  • Last modified: 2019/08/21 16:05
  • by tmomas