The reason is that on GL devices there is a hard-coded value in the script I referred to earlier at line 63: [ "$classlessroute" = "0" ] || append dhcpopts "-O 121"
This line needs to be commented out to ensure all interfaces are running without this option.
I was assuming the native OpenWRT behavior would apply. Whats the reason Glinet hard corded 121 into the script? I dont see any plausible reason for it. Also on normal OpenWRT classlessroute 0 is the default behavior.
āAs long as VPN isnāt affected all is fine.ā no? what about people not using VPN and then get manipulated routes this way? as I said, this is not only about VPN leaks. it can also be used to change specific routes when you dont use a VPN.
As I wrote above you can manipulate WAN routes all the time. Just set another route on the router next to WAN - tadaaaa! - manipulated. Every router is independent.
The only dangerous thing would be if it would be possible to overwrite routes which are used on LAN side or default route or specific VPN route. But alzaho already confirmed this isnāt possible.
Sharing the same CVE over and over again wonāt change anything.
All about this CVE is about client systems running client routing-based VPNs.
As long as the router decides based on firewall and interface config where to send traffic you can try to add as many routes on WAN side as you want, wonāt help exploiting.