Search criteria
3 vulnerabilities found for s200_firmware by gl-inet
FKIE_CVE-2024-27356
Vulnerability from fkie_nvd - Published: 2024-02-27 01:15 - Updated: 2025-09-18 16:27
Severity ?
Summary
An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1F7E41-943A-4479-A948-CC4693837A46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3DD919-EC2B-44CF-AEBD-4EA5A0D52552",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB6A9FCE-2C4E-4465-ADC8-BEFA227BBF2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "79D3F6BA-60D2-495A-8C74-7E74D3DB25A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9C4B6800-8A1B-4522-B5E0-9CC4C09DBA2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AED7B3A1-7DEB-4DB0-AA6E-7D27434BD2CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE60C1C-957D-472A-BB66-21DA80B97099",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD782342-ED71-4BD6-97EB-330F14991957",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s200_firmware:4.1.4-0300:*:*:*:*:*:*:*",
"matchCriteriaId": "8770141F-8E4A-4A44-B60C-1011F103FF24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF1C3533-B1E2-4B96-B235-5BE9951E16BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB74B0F-E141-403A-B480-5B48B9040D4E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.37:*:*:*:*:*:*:*",
"matchCriteriaId": "26456346-BEE7-4C6D-96D4-8180B31F526F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B237E3A0-AF65-4CA9-AF31-EA5A6AF05A14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0558E6-FAC8-4569-9AA4-C96823E591C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "993B06A2-2BB4-4EBC-904E-802001D9DFEC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AD8F61AA-DE3B-44DC-AE73-7D8E807F918E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E53CE790-1466-4BB0-933B-33B531C0DD55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "83E73FCD-31F7-4BE9-8D16-FB4FDAC685BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1EDB92-F871-4F92-B5CB-9DE24A908D8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F5BB0698-5585-4511-88EA-7C265EF22F10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x300b_firmware:3.217:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC7434D-18F1-4281-B491-62E194F8A265",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
"matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gl-inet:x1200_firmware:3.203:*:*:*:*:*:*:*",
"matchCriteriaId": "64BE6D1D-561D-4A2F-9AC6-F96B8B2DAFB2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:gl-inet:x1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CCE280-ACB1-4057-B08C-4436D33EF156",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet. Los atacantes pueden descargar archivos, como registros, mediante comandos, obteniendo potencialmente informaci\u00f3n cr\u00edtica del usuario. Esto afecta a MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3. 10 , X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216 y X1200 3.203."
}
],
"id": "CVE-2024-27356",
"lastModified": "2025-09-18T16:27:34.320",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-02-27T01:15:07.197",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://gl-inet.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://gl-inet.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CVE-2024-27356 (GCVE-0-2024-27356)
Vulnerability from cvelistv5 – Published: 2024-02-27 00:00 – Updated: 2025-03-24 15:44
VLAI?
Summary
An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T00:34:51.986Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gl-inet.com"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gl-inet:mt1300:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar750:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar750s:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750s",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:h:gl.inet:MT6000:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "MT6000",
"vendor": "gl.inet",
"versions": [
{
"status": "affected",
"version": "4.5.5"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:xe3000:4.4.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:x3000:4.4.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.5"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mt3000:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mt2500:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt2500",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:axt1800:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "axt1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ax1800:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ax1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:a1300:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "a1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:s200:4.1.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.1.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:0300:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "0300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:x750:4.3.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:sft1200:4.3.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sft1200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:xe300:4.3.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar3000m:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar3000m",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar3000m16:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar3000m16",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:b1300:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mt300nv2:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt300nv2",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:x300b:3.217:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x300b",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.217"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:s1300:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:sf1200:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sf1200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mv1000:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:n300:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "n300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:b2200:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b2200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-i:x1200:3.203:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x1200",
"vendor": "gl-i",
"versions": [
{
"status": "affected",
"version": "3.203"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-27356",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-27T15:51:15.040940Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-24T15:44:54.024Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-27T00:17:16.406Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gl-inet.com"
},
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-27356",
"datePublished": "2024-02-27T00:00:00.000Z",
"dateReserved": "2024-02-25T00:00:00.000Z",
"dateUpdated": "2025-03-24T15:44:54.024Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-27356 (GCVE-0-2024-27356)
Vulnerability from nvd – Published: 2024-02-27 00:00 – Updated: 2025-03-24 15:44
VLAI?
Summary
An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T00:34:51.986Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gl-inet.com"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gl-inet:mt1300:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar750:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar750s:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750s",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:h:gl.inet:MT6000:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "MT6000",
"vendor": "gl.inet",
"versions": [
{
"status": "affected",
"version": "4.5.5"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:xe3000:4.4.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:x3000:4.4.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.5"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mt3000:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mt2500:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt2500",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:axt1800:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "axt1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ax1800:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ax1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:a1300:4.5.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "a1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:s200:4.1.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.1.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:0300:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "0300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:x750:4.3.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:sft1200:4.3.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sft1200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:xe300:4.3.7:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.7"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar3000m:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar3000m",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:ar3000m16:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar3000m16",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:b1300:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mt300nv2:4.3.10:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt300nv2",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.10"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:x300b:3.217:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x300b",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.217"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:s1300:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:sf1200:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sf1200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:mv1000:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:n300:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "n300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:b2200:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b2200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-i:x1200:3.203:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x1200",
"vendor": "gl-i",
"versions": [
{
"status": "affected",
"version": "3.203"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-27356",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-27T15:51:15.040940Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-24T15:44:54.024Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-27T00:17:16.406Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://gl-inet.com"
},
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-27356",
"datePublished": "2024-02-27T00:00:00.000Z",
"dateReserved": "2024-02-25T00:00:00.000Z",
"dateUpdated": "2025-03-24T15:44:54.024Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}