The vulnerability is tracked as CVE-2020–8597.
According to Hacker News, a critical PPP daemon flaw can open most Linux systems to remote hackers. Users with affected operating systems and devices are advised to apply security patches as soon as possible, or when it becomes available.
Currently, we patched the flaw via updating the related plug-ins for these GL.iNet routers:
Check the bottom label of your router to make sure the module name. You can get your router patched by following the steps as below,



The vulnerability, tracked as CVE-2020–8597 with CVSS Score 9.8, can be exploited by unauthenticated attackers to remotely execute arbitrary code on affected systems and take full control over them. We urge you to follow above steps to patch the flaw as soon as possible. For more information, you can email to support@glinet.biz or post on our forum.
{"one"=>"Select 2 or 3 items to compare", "other"=>"{{ count }} of 3 items selected"}