Difference between revisions of "Main Page"
From OpenPLi Wiki
Rick Hunter (talk | contribs) |
Rick Hunter (talk | contribs) |
||
Line 100: | Line 100: | ||
<span style="color:Red;font-size: 200%">Attention<br/> | <span style="color:Red;font-size: 200%">Attention<br/> | ||
− | |||
{| | {| | ||
|- | |- | ||
− | | style="background:#F5FFFA; border:1px solid #CEF2E0; padding:1em; margin:auto;"| With the CVE number mentioned | + | | style="background:#F5FFFA; border:1px solid #CEF2E0; padding:1em; margin:auto;"| With the CVE number mentioned below a serious vulnerability in relation to the OpenWebIf has been reported. <br />See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details. |
− | See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details. | ||
The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!! | The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!! | ||
The OpenWebIf team has released a solution for this problem. <u>'''Receivers with a image BEFORE june 25th 2017 are affected this problem.'''</u> | The OpenWebIf team has released a solution for this problem. <u>'''Receivers with a image BEFORE june 25th 2017 are affected this problem.'''</u> | ||
''Posted at: june 24th 2017'' | ''Posted at: june 24th 2017'' | ||
− | |||
|} | |} | ||
Revision as of 21:36, 24 June 2017
Welcome to the OpenPLi® Wiki
Today is: Monday, November 25 2024 - 11:48 GMT
Basic section:
Advanced section:
• External device support | • Overscan | |
• Unicable / Jess | • GStreamer | |
• SD HD 4K | • VPN | |
• TV-Headend | • DVB-S/S2/C/T/S2X Tuners | • Multistream |
• Offline decoding | • Full Band Capture Tuner (FBC) |
Expert section:
• Information for Developers
• How to create a Bootlogo
• UP-Download magazine (Dutch language)
It is our goal to make this OpenPLi® WikiPedia:Wiki into a OpenPLi® software knowledge base, with all information imaginable about both enigma based and the OpenPLi® firmware images.
Looking for our forum? Go to https://forums.openpli.org
Attention
With the CVE number mentioned below a serious vulnerability in relation to the OpenWebIf has been reported. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details. The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!! The OpenWebIf team has released a solution for this problem. Receivers with a image BEFORE june 25th 2017 are affected this problem. Posted at: june 24th 2017 |