Difference between revisions of "Main Page"

From OpenPLi Wiki
Jump to: navigation, search
Line 1: Line 1:
 
<strong>
 
<strong>
<span style="color:SteelBlue;font-size: 200%">Welcome to the Open'''PLi'''<sub><small>®</small></sub> Wiki
+
<span style="color:SteelBlue;font-size: 200%">Welcome to the Open'''PLi'''<sub><small>®</small></sub> Wiki<br/>
<br/>
+
<span style="color:Black;font-size: 50%">
 +
Today is: {{CURRENTDAYNAME}}, {{CURRENTMONTHNAME}} {{CURRENTDAY}} {{CURRENTYEAR}} - {{CURRENTTIME}} GMT
 +
 
 
----
 
----
 
'''Basic section:'''
 
'''Basic section:'''
Line 99: Line 101:
 
<span style="color:Red;font-size: 200%">Attention<br/>
 
<span style="color:Red;font-size: 200%">Attention<br/>
  
With the CVE number mentioned above a serious vulnerability in relation to the OpenWebIf has been reported. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details.
+
With the CVE number mentioned above a serious vulnerability in relation to the OpenWebIf has been reported. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details.
The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!!
+
The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!!
   
+
 
The OpenWebIf team has released a solution for this problem.
+
  The OpenWebIf team has released a solution for this problem. <u>'''Receivers with a image BEFORE june 25th 2017 are affected this problem.'''</u>
<u> '''Receivers with a image BEFORE june 25th 2017 are affected this problem.'''</u>
+
''Posted at: june 24th 2017''
</div>
 
  
  

Revision as of 21:22, 24 June 2017

Welcome to the OpenPLi® Wiki
Today is: Thursday, March 28 2024 - 15:34 GMT


Basic section:


MAIN-OpenPli-001.gif
Receivers • Cable settings information • Channel Settings
• Installation • Backup • Settings editors
• Plugin Wiki • Softcam Wiki
• HbbTV • Transcoding • HDMI-CEC
• Webif • Remote Fallback Tuner • Satfinders
• Hotkey • Hidden functions • MountManager
• Tips and Tweaks • Abbreviations



Advanced section:


• External device support • Overscan
• Unicable / Jess • GStreamer
• SD HD 4K • VPN
• TV-Headend • DVB-S/S2/C/T/S2X Tuners • Multistream
• Offline decoding • Full Band Capture Tuner (FBC)



Expert section:


• Information for Developers • How to create a Bootlogo



• History

• UP-Download magazine (Dutch language)


It is our goal to make this OpenPLi® WikiPedia:Wiki into a OpenPLi® software knowledge base, with all information imaginable about both enigma based and the OpenPLi® firmware images.

Looking for our forum? Go to https://forums.openpli.org


Attention

With the CVE number mentioned above a serious vulnerability in relation to the OpenWebIf has been reported. See https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9807 for details.
The vulnerability makes it possible to create, overwrite or change arbitrary files using a specially formulated web request. Every Enigma2 version with an installed OpenWebIf is impacted. For  those who still have their box open, connected to the internet without the use of a VPN: Please switch this off immediately, before your box is hacked!!!
 
The OpenWebIf team has released a solution for this problem. Receivers with a image BEFORE june 25th 2017 are affected this problem.
Posted at: june 24th 2017























































































































































































































































































































































































































































































































































Moderator page