Re: [Security] Confidential report submitted — TCP connection hijack & DoS (CVE-2023-30312 related)

Paul Spooren mail at aparcar.org
Mon Oct 27 08:35:55 PDT 2025


Dear Minghao,

Thanks for your report, we’ll evaluate this internally and get back to you.

Kind regards,
Paul

PS your email was initially tagged as spam by our system, so good thing you double posted!

> On 27. Oct 2025, at 16:14, zhangmh25 at mails.tsinghua.edu.cn wrote:
> 
> Hello OpenWrt administrators,
> 
> 
> This is a brief public notice that a confidential security report was submitted to contact at openwrt.org earlier today with the subject line:
> 
>  "[Security] OpenWrt TCP Connection Hijacking Vulnerabilities Report"
> 
> 
> Summary:
> 
> - We discovered two new attack vectors that resurrected CVE-2023-30312.
> - When exploited they can lead to TCP connection hijacking and denial-of-service conditions on affected OpenWrt releases.
> - The overall severity is high due to potential session takeover and widespread service disruption on affected systems.
> 
> 
> We submitted full technical details and proposed mitigations to contact at openwrt.org for coordinated disclosure. Please treat the submission as confidential;
> 
> Request:
> 
> - Kindly acknowledge receipt on this mailing list (or by replying to the confidential report) so we know the report reached the appropriate team.
> - If you did not receive the confidential report at contact at openwrt.org, please let us know and we will re-send or use an alternate secure channel.
> 
> 
> Contact 
> 
> Minghao Zhang [zhangmh25 at mails.tsinghua.edu.cn]
> Jianjun Chen [jianjun at tsinghua.edu.cn]
> 
> Thank you,
> 
> Minghao Zhang
> 
> _______________________________________________
> openwrt-adm mailing list
> openwrt-adm at lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-adm




More information about the openwrt-adm mailing list