Search criteria
42 vulnerabilities found for ax1800_firmware by gl-inet
CVE-2025-67090 (GCVE-0-2025-67090)
Vulnerability from nvd – Published: 2026-01-08 00:00 – Updated: 2026-01-08 16:51
VLAI?
Summary
The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.
Severity ?
5.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-67090",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-08T16:46:22.573728Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T16:51:52.244Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T16:17:12.182Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.gl-inet.com/security/"
},
{
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub"
},
{
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-67090",
"datePublished": "2026-01-08T00:00:00.000Z",
"dateReserved": "2025-12-08T00:00:00.000Z",
"dateUpdated": "2026-01-08T16:51:52.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-67091 (GCVE-0-2025-67091)
Vulnerability from nvd – Published: 2026-01-08 00:00 – Updated: 2026-01-08 16:10
VLAI?
Summary
An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-67091",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-08T16:01:36.967250Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T16:10:44.603Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL Inet GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T15:52:18.373Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.gl-inet.com/"
},
{
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub"
},
{
"url": "https://aleksazatezalo.medium.com/critical-authentication-bypass-vulnerability-in-gl-inet-gl-axt1800-router-firmware-f19442ca721d"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-67091",
"datePublished": "2026-01-08T00:00:00.000Z",
"dateReserved": "2025-12-08T00:00:00.000Z",
"dateUpdated": "2026-01-08T16:10:44.603Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2024-45263 (GCVE-0-2024-45263)
Vulnerability from nvd – Published: 2024-10-24 00:00 – Updated: 2024-10-28 18:52
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45263",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T18:34:32.730872Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T18:52:30.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:21:28.712298",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45263",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T18:52:30.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45262 (GCVE-0-2024-45262)
Vulnerability from nvd – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:22
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45262",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:21:47.832625Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:22:25.505Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:19:54.001322",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Improper%20Pathname%20Restriction%20Leading%20to%20Path%20Traversal%20in%20Restricted%20Directories.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45262",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:22:25.505Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45259 (GCVE-0-2024-45259)
Vulnerability from nvd – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:38
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45259",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:31:51.013958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-326",
"description": "CWE-326 Inadequate Encryption Strength",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:38:53.728Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:09:41.653293",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45259",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:38:53.728Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45260 (GCVE-0-2024-45260)
Vulnerability from nvd – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:27
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it.
Severity ?
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45260",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:24:33.863289Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:27:01.398Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:11:10.715386",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Unauthorized%20Access%20to%20File%20Download%20and%20Upload%20Interfaces.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45260",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:27:01.398Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45261 (GCVE-0-2024-45261)
Vulnerability from nvd – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:19
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.
Severity ?
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45261",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:12:05.989024Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:19:59.290Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application\u0027s authentication procedures, they can generate a valid SID, escalate privileges, and gain full control."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:18:25.796189",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45261",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:19:59.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-28077 (GCVE-0-2024-28077)
Vulnerability from nvd – Published: 2024-08-26 00:00 – Updated: 2025-03-14 13:12
VLAI?
Summary
A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-28077",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-14T13:06:19.124374Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-14T13:12:01.317Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-26T19:29:58.213Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gl-inet.com"
},
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-28077",
"datePublished": "2024-08-26T00:00:00.000Z",
"dateReserved": "2024-03-03T00:00:00.000Z",
"dateUpdated": "2025-03-14T13:12:01.317Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2025-67091
Vulnerability from fkie_nvd - Published: 2026-01-08 16:15 - Updated: 2026-01-16 21:28
Severity ?
Summary
An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://aleksazatezalo.medium.com/critical-authentication-bypass-vulnerability-in-gl-inet-gl-axt1800-router-firmware-f19442ca721d | Exploit, Third Party Advisory, Press/Media Coverage | |
| cve@mitre.org | https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub | Exploit, Third Party Advisory, Press/Media Coverage | |
| cve@mitre.org | https://www.gl-inet.com/ | Product |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| gl-inet | ax1800_firmware | 4.2.0 | |
| gl-inet | ax1800_firmware | 4.6.4 | |
| gl-inet | ax1800_firmware | 4.6.8 | |
| gl-inet | ax1800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "053BBC44-BD1D-40FD-91DC-D69A26CDE1AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D71DBB4-E154-47AC-9F4C-1C9912CB2880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1B1DB6-6773-48D0-A936-3B623DB3D558",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL Inet GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory."
}
],
"id": "CVE-2025-67091",
"lastModified": "2026-01-16T21:28:39.047",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-08T16:15:45.577",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Press/Media Coverage"
],
"url": "https://aleksazatezalo.medium.com/critical-authentication-bypass-vulnerability-in-gl-inet-gl-axt1800-router-firmware-f19442ca721d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Press/Media Coverage"
],
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.gl-inet.com/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-67090
Vulnerability from fkie_nvd - Published: 2026-01-08 16:15 - Updated: 2026-01-16 21:28
Severity ?
Summary
The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51 | Exploit, Third Party Advisory, Press/Media Coverage | |
| cve@mitre.org | https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub | Exploit, Third Party Advisory, Press/Media Coverage | |
| cve@mitre.org | https://www.gl-inet.com/security/ | Broken Link |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| gl-inet | ax1800_firmware | 4.2.0 | |
| gl-inet | ax1800_firmware | 4.6.4 | |
| gl-inet | ax1800_firmware | 4.6.8 | |
| gl-inet | ax1800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "053BBC44-BD1D-40FD-91DC-D69A26CDE1AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D71DBB4-E154-47AC-9F4C-1C9912CB2880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1B1DB6-6773-48D0-A936-3B623DB3D558",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface."
}
],
"id": "CVE-2025-67090",
"lastModified": "2026-01-16T21:28:08.207",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-01-08T16:15:45.470",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Press/Media Coverage"
],
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Press/Media Coverage"
],
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://www.gl-inet.com/security/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-45262
Vulnerability from fkie_nvd - Published: 2024-10-24 21:15 - Updated: 2025-10-15 17:54
Severity ?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8537E0A-8726-4355-AA99-06445A43D4D5",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4607385A-CD71-4809-A143-EE2E9DE0F69A",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81DEAE12-BC9B-40C5-9D51-25A478670A73",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b3000_firmware:4.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "38EDCC99-D442-4FC5-B9DC-5CF38B6EE1FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA9AD80-5B5E-4736-9146-5F58212D2988",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B48595C6-E07A-4E74-B695-D6D679B6A3ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FAB581-A524-4521-A293-84DD106543C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F075420C-AD43-475E-8398-114AAA4002EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "998569E6-B905-4195-B333-FFFB255EA1FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A48B5B4A-D6E1-478C-B983-FFD1AC9AA4F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "334563F9-7746-48A4-9E37-0AF55F44DC6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "744B2B01-1F28-429F-A898-056470D0DFE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "64F877D5-D386-4390-8B32-E7110C6E7463",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE85DAF-B5ED-4D5B-A009-BC7FA2AD0F92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BC42BD-03FA-45C1-A7D9-BA9DBE68B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1406DB81-E531-4648-B427-AB98793BC76A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EB18BA54-1E3A-42DE-A4BD-07A96CE04663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32494D06-2D09-4A26-B9AF-69F0682638D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E548391D-3E1D-4A8C-8F7C-8740EAD5CB9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "425AB7BB-4BFC-463F-A0B8-9B1CC7A47FAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18C5A721-8F18-450A-8BA9-01AAFECBE5A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BD86A8-D5BA-41D8-BA9F-7228DE2C86F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet, incluidos MT6000, MT3000, MT2500, AXT1800 y AX1800 4.6.2. El par\u00e1metro params en el m\u00e9todo de llamada del endpoint /rpc es vulnerable a la navegaci\u00f3n arbitraria de directorios, lo que permite a los atacantes ejecutar scripts en cualquier ruta."
}
],
"id": "CVE-2024-45262",
"lastModified": "2025-10-15T17:54:36.687",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-24T21:15:12.143",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Improper%20Pathname%20Restriction%20Leading%20to%20Path%20Traversal%20in%20Restricted%20Directories.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-45263
Vulnerability from fkie_nvd - Published: 2024-10-24 21:15 - Updated: 2025-09-29 15:02
Severity ?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md | Issue Tracking, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E548391D-3E1D-4A8C-8F7C-8740EAD5CB9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02F67B09-8A97-4235-BBFC-24B72C2F8B1F",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8537E0A-8726-4355-AA99-06445A43D4D5",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4607385A-CD71-4809-A143-EE2E9DE0F69A",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81DEAE12-BC9B-40C5-9D51-25A478670A73",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b3000_firmware:4.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "38EDCC99-D442-4FC5-B9DC-5CF38B6EE1FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA9AD80-5B5E-4736-9146-5F58212D2988",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B48595C6-E07A-4E74-B695-D6D679B6A3ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FAB581-A524-4521-A293-84DD106543C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F075420C-AD43-475E-8398-114AAA4002EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "998569E6-B905-4195-B333-FFFB255EA1FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A48B5B4A-D6E1-478C-B983-FFD1AC9AA4F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "334563F9-7746-48A4-9E37-0AF55F44DC6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "744B2B01-1F28-429F-A898-056470D0DFE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "64F877D5-D386-4390-8B32-E7110C6E7463",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE85DAF-B5ED-4D5B-A009-BC7FA2AD0F92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BC42BD-03FA-45C1-A7D9-BA9DBE68B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1406DB81-E531-4648-B427-AB98793BC76A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EB18BA54-1E3A-42DE-A4BD-07A96CE04663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BD86A8-D5BA-41D8-BA9F-7228DE2C86F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "425AB7BB-4BFC-463F-A0B8-9B1CC7A47FAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32494D06-2D09-4A26-B9AF-69F0682638D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet, incluidos MT6000, MT3000, MT2500, AXT1800 y AX1800 4.6.2. La interfaz de carga permite cargar archivos arbitrarios al dispositivo. Una vez que el dispositivo ejecuta los archivos, puede provocar una fuga de informaci\u00f3n, lo que permite un control total."
}
],
"id": "CVE-2024-45263",
"lastModified": "2025-09-29T15:02:17.183",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-24T21:15:12.217",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-45261
Vulnerability from fkie_nvd - Published: 2024-10-24 21:15 - Updated: 2025-10-15 17:54
Severity ?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8537E0A-8726-4355-AA99-06445A43D4D5",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4607385A-CD71-4809-A143-EE2E9DE0F69A",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81DEAE12-BC9B-40C5-9D51-25A478670A73",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b3000_firmware:4.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "38EDCC99-D442-4FC5-B9DC-5CF38B6EE1FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA9AD80-5B5E-4736-9146-5F58212D2988",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B48595C6-E07A-4E74-B695-D6D679B6A3ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FAB581-A524-4521-A293-84DD106543C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F075420C-AD43-475E-8398-114AAA4002EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "998569E6-B905-4195-B333-FFFB255EA1FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A48B5B4A-D6E1-478C-B983-FFD1AC9AA4F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "334563F9-7746-48A4-9E37-0AF55F44DC6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "744B2B01-1F28-429F-A898-056470D0DFE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "64F877D5-D386-4390-8B32-E7110C6E7463",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE85DAF-B5ED-4D5B-A009-BC7FA2AD0F92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BC42BD-03FA-45C1-A7D9-BA9DBE68B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1406DB81-E531-4648-B427-AB98793BC76A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EB18BA54-1E3A-42DE-A4BD-07A96CE04663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32494D06-2D09-4A26-B9AF-69F0682638D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18C5A721-8F18-450A-8BA9-01AAFECBE5A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BD86A8-D5BA-41D8-BA9F-7228DE2C86F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E548391D-3E1D-4A8C-8F7C-8740EAD5CB9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "425AB7BB-4BFC-463F-A0B8-9B1CC7A47FAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application\u0027s authentication procedures, they can generate a valid SID, escalate privileges, and gain full control."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet, incluidos MT6000, MT3000, MT2500, AXT1800 y AX1800 4.6.2. El SID generado para un usuario espec\u00edfico no est\u00e1 vinculado a ese usuario en s\u00ed, lo que permite que otros usuarios lo utilicen potencialmente para la autenticaci\u00f3n. Una vez que un atacante elude los procedimientos de autenticaci\u00f3n de la aplicaci\u00f3n, puede generar un SID v\u00e1lido, escalar privilegios y obtener el control total."
}
],
"id": "CVE-2024-45261",
"lastModified": "2025-10-15T17:54:46.297",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-24T21:15:12.057",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-45260
Vulnerability from fkie_nvd - Published: 2024-10-24 21:15 - Updated: 2025-10-15 17:55
Severity ?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Unauthorized%20Access%20to%20File%20Download%20and%20Upload%20Interfaces.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E548391D-3E1D-4A8C-8F7C-8740EAD5CB9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "425AB7BB-4BFC-463F-A0B8-9B1CC7A47FAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8537E0A-8726-4355-AA99-06445A43D4D5",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4607385A-CD71-4809-A143-EE2E9DE0F69A",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81DEAE12-BC9B-40C5-9D51-25A478670A73",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b3000_firmware:4.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "38EDCC99-D442-4FC5-B9DC-5CF38B6EE1FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA9AD80-5B5E-4736-9146-5F58212D2988",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B48595C6-E07A-4E74-B695-D6D679B6A3ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FAB581-A524-4521-A293-84DD106543C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F075420C-AD43-475E-8398-114AAA4002EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "998569E6-B905-4195-B333-FFFB255EA1FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A48B5B4A-D6E1-478C-B983-FFD1AC9AA4F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "334563F9-7746-48A4-9E37-0AF55F44DC6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "744B2B01-1F28-429F-A898-056470D0DFE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "64F877D5-D386-4390-8B32-E7110C6E7463",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE85DAF-B5ED-4D5B-A009-BC7FA2AD0F92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BC42BD-03FA-45C1-A7D9-BA9DBE68B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1406DB81-E531-4648-B427-AB98793BC76A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EB18BA54-1E3A-42DE-A4BD-07A96CE04663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32494D06-2D09-4A26-B9AF-69F0682638D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18C5A721-8F18-450A-8BA9-01AAFECBE5A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BD86A8-D5BA-41D8-BA9F-7228DE2C86F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet, incluidos MT6000, MT3000, MT2500, AXT1800 y AX1800 4.6.2. Los usuarios que pertenecen a grupos no autorizados pueden invocar cualquier interfaz del dispositivo y, de esta manera, obtener control total sobre \u00e9l."
}
],
"id": "CVE-2024-45260",
"lastModified": "2025-10-15T17:55:07.070",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-24T21:15:11.977",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Unauthorized%20Access%20to%20File%20Download%20and%20Upload%20Interfaces.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-45259
Vulnerability from fkie_nvd - Published: 2024-10-24 20:15 - Updated: 2025-10-15 17:55
Severity ?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "18C5A721-8F18-450A-8BA9-01AAFECBE5A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8537E0A-8726-4355-AA99-06445A43D4D5",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4607385A-CD71-4809-A143-EE2E9DE0F69A",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81DEAE12-BC9B-40C5-9D51-25A478670A73",
"versionEndExcluding": "4.6.4",
"versionStartIncluding": "4.6.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b3000_firmware:4.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "38EDCC99-D442-4FC5-B9DC-5CF38B6EE1FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EA9AD80-5B5E-4736-9146-5F58212D2988",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B48595C6-E07A-4E74-B695-D6D679B6A3ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FAB581-A524-4521-A293-84DD106543C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F075420C-AD43-475E-8398-114AAA4002EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "998569E6-B905-4195-B333-FFFB255EA1FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A48B5B4A-D6E1-478C-B983-FFD1AC9AA4F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "334563F9-7746-48A4-9E37-0AF55F44DC6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "744B2B01-1F28-429F-A898-056470D0DFE1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "64F877D5-D386-4390-8B32-E7110C6E7463",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE85DAF-B5ED-4D5B-A009-BC7FA2AD0F92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BC42BD-03FA-45C1-A7D9-BA9DBE68B7A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "1406DB81-E531-4648-B427-AB98793BC76A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EB18BA54-1E3A-42DE-A4BD-07A96CE04663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BD86A8-D5BA-41D8-BA9F-7228DE2C86F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32494D06-2D09-4A26-B9AF-69F0682638D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "425AB7BB-4BFC-463F-A0B8-9B1CC7A47FAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E548391D-3E1D-4A8C-8F7C-8740EAD5CB9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet, incluidos MT6000, MT3000, MT2500, AXT1800 y AX1800 4.6.2. Al interceptar una solicitud HTTP y cambiar la propiedad del nombre de archivo en la interfaz de descarga, se puede eliminar cualquier archivo del dispositivo."
}
],
"id": "CVE-2024-45259",
"lastModified": "2025-10-15T17:55:27.800",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-24T20:15:04.323",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-326"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-28077
Vulnerability from fkie_nvd - Published: 2024-08-26 20:15 - Updated: 2025-03-14 14:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md | Third Party Advisory | |
| cve@mitre.org | https://gl-inet.com | Product |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| gl-inet | mt6000_firmware | 4.5.6 | |
| gl-inet | mt6000 | - | |
| gl-inet | x3000_firmware | 4.4.6 | |
| gl-inet | x3000 | - | |
| gl-inet | xe3000_firmware | 4.4.4 | |
| gl-inet | xe3000 | - | |
| gl-inet | a1300_firmware | 4.5.0 | |
| gl-inet | a1300 | - | |
| gl-inet | ax1800_firmware | 4.5.0 | |
| gl-inet | ax1800 | - | |
| gl-inet | axt1800_firmware | 4.5.0 | |
| gl-inet | axt1800 | - | |
| gl-inet | mt2500_firmware | 4.5.0 | |
| gl-inet | mt2500 | - | |
| gl-inet | mt3000_firmware | 4.5.0 | |
| gl-inet | mt3000 | - | |
| gl-inet | xe300_firmware | 4.3.16 | |
| gl-inet | xe300 | - | |
| gl-inet | x750_firmware | 4.3.7 | |
| gl-inet | x750 | - | |
| gl-inet | sft1200_firmware | 4.3.7 | |
| gl-inet | sft1200 | - | |
| gl-inet | ar300m_firmware | 4.3.10 | |
| gl-inet | ar300m | - | |
| gl-inet | ar300m16_firmware | 4.3.10 | |
| gl-inet | ar300m16 | - | |
| gl-inet | ar750_firmware | 4.3.10 | |
| gl-inet | ar750 | - | |
| gl-inet | ar750s_firmware | 4.3.10 | |
| gl-inet | ar750s | - | |
| gl-inet | b1300_firmware | 4.3.10 | |
| gl-inet | b1300 | - | |
| gl-inet | mt1300_firmware | 4.3.10 | |
| gl-inet | mt1300 | - | |
| gl-inet | mt300n-v2_firmware | 4.3.10 | |
| gl-inet | mt300n-v2 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1C6413-DB3D-4B14-9246-38AA5103615D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "861A5EB1-2DFF-479C-9202-590DB6E796C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3DD919-EC2B-44CF-AEBD-4EA5A0D52552",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD782342-ED71-4BD6-97EB-330F14991957",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE60C1C-957D-472A-BB66-21DA80B97099",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AED7B3A1-7DEB-4DB0-AA6E-7D27434BD2CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9C4B6800-8A1B-4522-B5E0-9CC4C09DBA2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79D3F6BA-60D2-495A-8C74-7E74D3DB25A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB74B0F-E141-403A-B480-5B48B9040D4E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE590D9-C0AB-4E3E-8E03-DBF12445AA0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E53CE790-1466-4BB0-933B-33B531C0DD55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "83E73FCD-31F7-4BE9-8D16-FB4FDAC685BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "993B06A2-2BB4-4EBC-904E-802001D9DFEC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AD8F61AA-DE3B-44DC-AE73-7D8E807F918E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1EDB92-F871-4F92-B5CB-9DE24A908D8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0558E6-FAC8-4569-9AA4-C96823E591C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F5BB0698-5585-4511-88EA-7C265EF22F10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema de denegaci\u00f3n de servicio en ciertos dispositivos GL-iNet. Algunos sitios web pueden detectar dispositivos expuestos a la red externa a trav\u00e9s de DDNS y, en consecuencia, obtener las direcciones IP y los puertos de los dispositivos que est\u00e1n expuestos. Al utilizar nombres de usuario especiales y caracteres especiales (como medio par\u00e9ntesis o corchetes), se puede llamar a la interfaz de inicio de sesi\u00f3n y provocar que el programa de administraci\u00f3n de sesiones falle, lo que provocar\u00e1 que los clientes no puedan iniciar sesi\u00f3n en sus dispositivos. Esto afecta a MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10 y XE300 4 .3. 16."
}
],
"id": "CVE-2024-28077",
"lastModified": "2025-03-14T14:15:14.653",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-26T20:15:07.733",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://gl-inet.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2024-39229
Vulnerability from fkie_nvd - Published: 2024-08-06 17:15 - Updated: 2024-11-21 19:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
"matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server."
},
{
"lang": "es",
"value": "Un problema en los productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4 y B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 permiten a los atacantes interceptar comunicaciones a trav\u00e9s de un ataque de intermediario cuando los clientes DDNS est\u00e1n reportando datos al servidor."
}
],
"id": "CVE-2024-39229",
"lastModified": "2024-11-21T19:15:09.887",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-06T17:15:54.027",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-924"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-39227
Vulnerability from fkie_nvd - Published: 2024-08-06 17:15 - Updated: 2024-08-15 16:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
"matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data."
},
{
"lang": "es",
"value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13 y XE3000/X3000 v4.4 conten\u00edan una vulnerabilidad de inyecci\u00f3n de shell a trav\u00e9s de la interfaz check_ovpn_client_config."
}
],
"id": "CVE-2024-39227",
"lastModified": "2024-08-15T16:15:19.650",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-06T17:15:53.943",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-74"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-75"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-39225
Vulnerability from fkie_nvd - Published: 2024-08-06 16:15 - Updated: 2024-08-15 16:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
"matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability."
},
{
"lang": "es",
"value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13 y XE3000/X3000 v4.4 conten\u00edan una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE)."
}
],
"id": "CVE-2024-39225",
"lastModified": "2024-08-15T16:15:19.317",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-06T16:15:48.647",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-39226
Vulnerability from fkie_nvd - Published: 2024-08-06 16:15 - Updated: 2024-11-12 17:35
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
"matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API."
},
{
"lang": "es",
"value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13 y XE3000/X3000 v4.4 conten\u00edan permisos inseguros en el endpoint /cgi-bin/glc. Esta vulnerabilidad permite a atacantes no autenticados ejecutar c\u00f3digo arbitrario o posiblemente atravesar un directorio a trav\u00e9s de datos JSON manipulados."
}
],
"id": "CVE-2024-39226",
"lastModified": "2024-11-12T17:35:08.293",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-06T16:15:48.757",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-39228
Vulnerability from fkie_nvd - Published: 2024-08-06 16:15 - Updated: 2024-08-15 16:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
"matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config."
},
{
"lang": "es",
"value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4 y B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 conten\u00edan una vulnerabilidad de inyecci\u00f3n de shell a trav\u00e9s de la interfaz check_config."
}
],
"id": "CVE-2024-39228",
"lastModified": "2024-08-15T16:15:19.800",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-08-06T16:15:48.850",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CVE-2025-67090 (GCVE-0-2025-67090)
Vulnerability from cvelistv5 – Published: 2026-01-08 00:00 – Updated: 2026-01-08 16:51
VLAI?
Summary
The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 & 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface.
Severity ?
5.1 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-67090",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-08T16:46:22.573728Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T16:51:52.244Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 are vulnerable. Fix available in version 4.8.2 GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 lacks rate limiting or account lockout mechanisms on the authentication endpoint (`/cgi-bin/luci`). An unauthenticated attacker on the local network can perform unlimited password attempts against the admin interface."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T16:17:12.182Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.gl-inet.com/security/"
},
{
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub"
},
{
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-67090",
"datePublished": "2026-01-08T00:00:00.000Z",
"dateReserved": "2025-12-08T00:00:00.000Z",
"dateUpdated": "2026-01-08T16:51:52.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-67091 (GCVE-0-2025-67091)
Vulnerability from cvelistv5 – Published: 2026-01-08 00:00 – Updated: 2026-01-08 16:10
VLAI?
Summary
An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-67091",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-08T16:01:36.967250Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T16:10:44.603Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL Inet GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 \u0026 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-08T15:52:18.373Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://www.gl-inet.com/"
},
{
"url": "https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub"
},
{
"url": "https://aleksazatezalo.medium.com/critical-authentication-bypass-vulnerability-in-gl-inet-gl-axt1800-router-firmware-f19442ca721d"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-67091",
"datePublished": "2026-01-08T00:00:00.000Z",
"dateReserved": "2025-12-08T00:00:00.000Z",
"dateUpdated": "2026-01-08T16:10:44.603Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2024-45263 (GCVE-0-2024-45263)
Vulnerability from cvelistv5 – Published: 2024-10-24 00:00 – Updated: 2024-10-28 18:52
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45263",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T18:34:32.730872Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T18:52:30.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:21:28.712298",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45263",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T18:52:30.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45262 (GCVE-0-2024-45262)
Vulnerability from cvelistv5 – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:22
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path.
Severity ?
8.8 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45262",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:21:47.832625Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:22:25.505Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:19:54.001322",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Improper%20Pathname%20Restriction%20Leading%20to%20Path%20Traversal%20in%20Restricted%20Directories.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45262",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:22:25.505Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45259 (GCVE-0-2024-45259)
Vulnerability from cvelistv5 – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:38
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45259",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:31:51.013958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-326",
"description": "CWE-326 Inadequate Encryption Strength",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:38:53.728Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:09:41.653293",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Delete%20Any%20File%20via%20Download%20Interface.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45259",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:38:53.728Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45260 (GCVE-0-2024-45260)
Vulnerability from cvelistv5 – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:27
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it.
Severity ?
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45260",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:24:33.863289Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:27:01.398Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:11:10.715386",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Unauthorized%20Access%20to%20File%20Download%20and%20Upload%20Interfaces.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45260",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:27:01.398Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-45261 (GCVE-0-2024-45261)
Vulnerability from cvelistv5 – Published: 2024-10-24 00:00 – Updated: 2024-10-28 19:19
VLAI?
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application's authentication procedures, they can generate a valid SID, escalate privileges, and gain full control.
Severity ?
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.19",
"status": "affected",
"version": "4.5.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.6.4",
"status": "affected",
"version": "4.6.2",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.5.18",
"status": "affected",
"version": "4.5.17",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.4.10",
"status": "affected",
"version": "4.4.9",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.19",
"status": "affected",
"version": "4.3.18",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"lessThan": "4.3.18",
"status": "affected",
"version": "4.3.17",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-45261",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-28T19:12:05.989024Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T19:19:59.290Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication. Once an attacker bypasses the application\u0027s authentication procedures, they can generate a valid SID, escalate privileges, and gain full control."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-24T20:18:25.796189",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypassing%20Login%20Mechanism%20with%20Passwordless%20User%20Login.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-45261",
"datePublished": "2024-10-24T00:00:00",
"dateReserved": "2024-08-25T00:00:00",
"dateUpdated": "2024-10-28T19:19:59.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-28077 (GCVE-0-2024-28077)
Vulnerability from cvelistv5 – Published: 2024-08-26 00:00 – Updated: 2025-03-14 13:12
VLAI?
Summary
A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-28077",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-14T13:06:19.124374Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-14T13:12:01.317Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-26T19:29:58.213Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gl-inet.com"
},
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-28077",
"datePublished": "2024-08-26T00:00:00.000Z",
"dateReserved": "2024-03-03T00:00:00.000Z",
"dateUpdated": "2025-03-14T13:12:01.317Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39229 (GCVE-0-2024-39229)
Vulnerability from cvelistv5 – Published: 2024-08-06 00:00 – Updated: 2024-11-21 18:43
VLAI?
Summary
An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39229",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T15:41:13.508119Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-924",
"description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T18:43:08.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:34:59.730690",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39229",
"datePublished": "2024-08-06T00:00:00",
"dateReserved": "2024-06-21T00:00:00",
"dateUpdated": "2024-11-21T18:43:08.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}