Vulnerabilites related to gl-inet - mt1300_firmware
CVE-2024-45263 (GCVE-0-2024-45263)
Vulnerability from cvelistv5
Published
2024-10-24 00:00
Modified
2024-10-28 18:52
CWE
  • n/a
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-b3000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-b3000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "lessThan": "4.5.19",
                "status": "affected",
                "version": "4.5.18",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-axt1800_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-mt2500_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-mt3000_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-mt6000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-mt6000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "lessThan": "4.6.4",
                "status": "affected",
                "version": "4.6.2",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-a1300_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-x300b_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-x300b_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "lessThan": "4.5.18",
                "status": "affected",
                "version": "4.5.17",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-x3000_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-xe300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "lessThan": "4.4.10",
                "status": "affected",
                "version": "4.4.9",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-mt1300_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-sft1200_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-x750_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-x750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "lessThan": "4.3.19",
                "status": "affected",
                "version": "4.3.18",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-ar300m16_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-ar750_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-ar300m_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-ar750s_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-b1300_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-e750_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:gl-inet:gl-xe300_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-xe300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "lessThan": "4.3.18",
                "status": "affected",
                "version": "4.3.17",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-45263",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-28T18:34:32.730872Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-434",
                "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T18:52:30.245Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-24T20:21:28.712298",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-45263",
    "datePublished": "2024-10-24T00:00:00",
    "dateReserved": "2024-08-25T00:00:00",
    "dateUpdated": "2024-10-28T18:52:30.245Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39226 (GCVE-0-2024-39226)
Vulnerability from cvelistv5
Published
2024-08-06 00:00
Modified
2024-11-12 17:08
CWE
  • n/a
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "LOW",
              "baseScore": 4.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-39226",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T16:17:15.444790Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T17:08:43.264Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-15T15:44:08.680202",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-39226",
    "datePublished": "2024-08-06T00:00:00",
    "dateReserved": "2024-06-21T00:00:00",
    "dateUpdated": "2024-11-12T17:08:43.264Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39229 (GCVE-0-2024-39229)
Vulnerability from cvelistv5
Published
2024-08-06 00:00
Modified
2024-11-21 18:43
CWE
  • n/a
Summary
An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-39229",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T15:41:13.508119Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-924",
                "description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T18:43:08.245Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-15T15:34:59.730690",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-39229",
    "datePublished": "2024-08-06T00:00:00",
    "dateReserved": "2024-06-21T00:00:00",
    "dateUpdated": "2024-11-21T18:43:08.245Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-27356 (GCVE-0-2024-27356)
Vulnerability from cvelistv5
Published
2024-02-27 00:00
Modified
2025-03-24 15:44
CWE
  • n/a
Summary
An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:34:51.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gl-inet.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt1300:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar750:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar750s:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750s",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:gl.inet:MT6000:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "MT6000",
            "vendor": "gl.inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.5"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:xe3000:4.4.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:x3000:4.4.5:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.5"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt3000:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt2500:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2500",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:axt1800:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "axt1800",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ax1800:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ax1800",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:a1300:4.5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "a1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:s200:4.1.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "s200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.1.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:0300:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "0300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:x750:4.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:sft1200:4.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sft1200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:xe300:4.3.7:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar3000m:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar3000m",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:ar3000m16:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar3000m16",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:b1300:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mt300nv2:4.3.10:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt300nv2",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.10"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:x300b:3.217:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x300b",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.217"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:s1300:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "s1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:sf1200:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sf1200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:mv1000:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mv1000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:n300:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "n300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:b2200:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b2200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-i:x1200:3.203:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x1200",
            "vendor": "gl-i",
            "versions": [
              {
                "status": "affected",
                "version": "3.203"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-27356",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-27T15:51:15.040940Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-200",
                "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-24T15:44:54.024Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-27T00:17:16.406Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gl-inet.com"
        },
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-27356",
    "datePublished": "2024-02-27T00:00:00.000Z",
    "dateReserved": "2024-02-25T00:00:00.000Z",
    "dateUpdated": "2025-03-24T15:44:54.024Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39228 (GCVE-0-2024-39228)
Vulnerability from cvelistv5
Published
2024-08-06 00:00
Modified
2024-08-15 15:36
Severity ?
CWE
  • n/a
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sft1200_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar300m_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar300m16_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750s_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt300n-v2_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ap1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.217"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b2200_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mv1000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mv1000w_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "usb150_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sf1200_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "n300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "s1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.5.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-mt6000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.8"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "a1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x300b_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ax1800_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2500_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt3000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x3000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.8"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:xe300_firmware:4.4.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.8"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "e750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.12"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-39228",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T14:17:52.681206Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-08T14:46:57.158Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-15T15:36:52.684349",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-39228",
    "datePublished": "2024-08-06T00:00:00",
    "dateReserved": "2024-06-21T00:00:00",
    "dateUpdated": "2024-08-15T15:36:52.684349",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39225 (GCVE-0-2024-39225)
Vulnerability from cvelistv5
Published
2024-08-06 00:00
Modified
2024-08-15 15:31
Severity ?
CWE
  • n/a
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt6000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.8"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "a1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x300b_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ax1800_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "axt1800_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt2500_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt3000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x3000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.8"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe3000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4.8"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "xe300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "e750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.12"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "x750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sft1200_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar300m_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar300m16_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ar750s_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mt300n-v2_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ap1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.217"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "b2200_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mv1000_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mv1000w_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "usb150_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "sf1200_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "n300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "s1300_firmware",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "3.216"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-39225",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-08T14:48:57.143782Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-307",
                "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-08T15:09:56.428Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-15T15:31:54.275410",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-39225",
    "datePublished": "2024-08-06T00:00:00",
    "dateReserved": "2024-06-21T00:00:00",
    "dateUpdated": "2024-08-15T15:31:54.275410",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-39227 (GCVE-0-2024-39227)
Vulnerability from cvelistv5
Published
2024-08-06 00:00
Modified
2024-08-15 15:40
Severity ?
CWE
  • n/a
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-mt2500:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-mt2500",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-axt1800:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-axt1800",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ax1800:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ax1800",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-a1300:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-a1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-x300b:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-x300b",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-xe300:4.3.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-xe300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.16"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-e750:4.3.12:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-e750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.12"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ap1300:4.3.13:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ap1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.13"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-s1300:4.3.13:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-s1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.13"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-xe3000:4.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-xe3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-x3000:4.4:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-x3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.4"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ar750:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ar750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ar750s:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ar750s",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ar300m:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ar300m",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ar300m16:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ar300m16",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-ar300n-v2:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-ar300n-v2",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-b1300:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-b1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-mt1300:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-mt1300",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-sft1200:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-sft1200",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-x750:4.3.11:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-x750",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.3.11"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:gl-inet:gl-mt3000:4.5.16:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gl-mt3000",
            "vendor": "gl-inet",
            "versions": [
              {
                "status": "affected",
                "version": "4.5.16"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-39227",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T14:01:03.559592Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-75",
                "description": "CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:56:43.943Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-15T15:40:35.188511",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-39227",
    "datePublished": "2024-08-06T00:00:00",
    "dateReserved": "2024-06-21T00:00:00",
    "dateUpdated": "2024-08-15T15:40:35.188511",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-28077 (GCVE-0-2024-28077)
Vulnerability from cvelistv5
Published
2024-08-26 00:00
Modified
2025-03-14 13:12
CWE
  • n/a
Summary
A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-28077",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-14T13:06:19.124374Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-14T13:12:01.317Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T19:29:58.213Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://gl-inet.com"
        },
        {
          "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-28077",
    "datePublished": "2024-08-26T00:00:00.000Z",
    "dateReserved": "2024-03-03T00:00:00.000Z",
    "dateUpdated": "2025-03-14T13:12:01.317Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2024-02-27 01:15
Modified
2025-09-18 16:27
Summary
An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1F7E41-943A-4479-A948-CC4693837A46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3DD919-EC2B-44CF-AEBD-4EA5A0D52552",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6A9FCE-2C4E-4465-ADC8-BEFA227BBF2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D3F6BA-60D2-495A-8C74-7E74D3DB25A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C4B6800-8A1B-4522-B5E0-9CC4C09DBA2A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED7B3A1-7DEB-4DB0-AA6E-7D27434BD2CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE60C1C-957D-472A-BB66-21DA80B97099",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD782342-ED71-4BD6-97EB-330F14991957",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s200_firmware:4.1.4-0300:*:*:*:*:*:*:*",
              "matchCriteriaId": "8770141F-8E4A-4A44-B60C-1011F103FF24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1C3533-B1E2-4B96-B235-5BE9951E16BF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB74B0F-E141-403A-B480-5B48B9040D4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "26456346-BEE7-4C6D-96D4-8180B31F526F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B237E3A0-AF65-4CA9-AF31-EA5A6AF05A14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0558E6-FAC8-4569-9AA4-C96823E591C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "993B06A2-2BB4-4EBC-904E-802001D9DFEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8F61AA-DE3B-44DC-AE73-7D8E807F918E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E53CE790-1466-4BB0-933B-33B531C0DD55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E73FCD-31F7-4BE9-8D16-FB4FDAC685BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1EDB92-F871-4F92-B5CB-9DE24A908D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BB0698-5585-4511-88EA-7C265EF22F10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:3.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC7434D-18F1-4281-B491-62E194F8A265",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x1200_firmware:3.203:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BE6D1D-561D-4A2F-9AC6-F96B8B2DAFB2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CCE280-ACB1-4057-B08C-4436D33EF156",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on certain GL-iNet devices. Attackers can download files such as logs via commands, potentially obtaining critical user information. This affects MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3.10, X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216, and X1200 3.203."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet. Los atacantes pueden descargar archivos, como registros, mediante comandos, obteniendo potencialmente informaci\u00f3n cr\u00edtica del usuario. Esto afecta a MT6000 4.5.5, XE3000 4.4.4, X3000 4.4.5, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, XE300 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-v2 4.3. 10 , X300B 3.217, S1300 3.216, SF1200 3.216, MV1000 3.216, N300 3.216, B2200 3.216 y X1200 3.203."
    }
  ],
  "id": "CVE-2024-27356",
  "lastModified": "2025-09-18T16:27:34.320",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-27T01:15:07.197",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://gl-inet.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://gl-inet.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-15 16:15
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability."
    },
    {
      "lang": "es",
      "value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13 y XE3000/X3000 v4.4 conten\u00edan una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE)."
    }
  ],
  "id": "CVE-2024-39225",
  "lastModified": "2024-08-15T16:15:19.317",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-06T16:15:48.647",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-307"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-307"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-06 17:15
Modified
2024-11-21 19:15
Summary
An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server."
    },
    {
      "lang": "es",
      "value": "Un problema en los productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4 y B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 permiten a los atacantes interceptar comunicaciones a trav\u00e9s de un ataque de intermediario cuando los clientes DDNS est\u00e1n reportando datos al servidor."
    }
  ],
  "id": "CVE-2024-39229",
  "lastModified": "2024-11-21T19:15:09.887",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-06T17:15:54.027",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-924"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-08-15 16:15
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config."
    },
    {
      "lang": "es",
      "value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4 y B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 conten\u00edan una vulnerabilidad de inyecci\u00f3n de shell a trav\u00e9s de la interfaz check_config."
    }
  ],
  "id": "CVE-2024-39228",
  "lastModified": "2024-08-15T16:15:19.800",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-06T16:15:48.850",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-06 17:15
Modified
2024-08-15 16:15
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data."
    },
    {
      "lang": "es",
      "value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13 y XE3000/X3000 v4.4 conten\u00edan una vulnerabilidad de inyecci\u00f3n de shell a trav\u00e9s de la interfaz check_ovpn_client_config."
    }
  ],
  "id": "CVE-2024-39227",
  "lastModified": "2024-08-15T16:15:19.650",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-06T17:15:53.943",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-75"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-06 16:15
Modified
2024-11-12 17:35
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "70AC521D-2DE4-4B7F-846D-A945A5EC0931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1123CE79-1C08-4408-A19A-DC1A4E74DA91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99FD7EE-B736-452B-B0F4-B045592023B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "61925658-3785-4E1C-B1B3-2F88B3F5FE52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E77ACF4-385E-48CB-87FC-F631A04ACBE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC51E4D-9784-4264-83BF-CB7DF70087E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD9AA29E-C1C0-4F18-AB85-DA8285B74EE3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C49C8A1-EA3A-4954-95C1-7691EEF6A532",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AC5207-7130-4B6A-A8E3-763050749DFA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D132DF3-58FC-4F9B-9518-B668A9564D97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E513879-5A56-4B91-913D-7C68B7323B8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D4CCC3-BFB2-449D-8947-FDDC722F15F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CFCB1B-1AA2-4D05-9545-D8864517F52E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ap1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D7EFDB-E10E-4D75-ABE2-CC3CE321F584",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C725432A-2F3B-46F9-B705-34ECC4299FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b2200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB4C645-59AA-4682-A487-C0DB2CF0A4F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1BD239-D370-4F14-A6B2-2C078170ECEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB8DF06-507E-4933-ABAD-1FB7D70CD3C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E3539B-172C-4AF3-AD1E-AED4937F1BB0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mv1000w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E9E6FC-346D-4D58-BD4E-84A81722A155",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABD5B0B-9763-4020-8858-1B67FACB125A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:usb150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCBDE54D-5475-41A6-8E17-EFF445B3C2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5D0C75-04DE-4315-9980-E8F31AE6F261",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sf1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F5BAAA-AE8C-41F3-8C41-B0223BDB4314",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF760DF0-D192-4FF8-BC24-F9F71EA365F6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:n300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F805B376-E08F-4D66-A301-59EF92E4082B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83CD9FC-F9BE-4B76-B387-AA2588631780",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:s1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8B6BB55-8107-490B-90FD-F7EE3A89C7D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API."
    },
    {
      "lang": "es",
      "value": "Productos GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4. 3.16, E750 v4. 3.12, AP1300/S1300 v4.3.13 y XE3000/X3000 v4.4 conten\u00edan permisos inseguros en el endpoint /cgi-bin/glc. Esta vulnerabilidad permite a atacantes no autenticados ejecutar c\u00f3digo arbitrario o posiblemente atravesar un directorio a trav\u00e9s de datos JSON manipulados."
    }
  ],
  "id": "CVE-2024-39226",
  "lastModified": "2024-11-12T17:35:08.293",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-06T16:15:48.757",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-24 21:15
Modified
2025-09-29 15:02
Summary
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E548391D-3E1D-4A8C-8F7C-8740EAD5CB9E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02F67B09-8A97-4235-BBFC-24B72C2F8B1F",
              "versionEndExcluding": "4.6.4",
              "versionStartIncluding": "4.6.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8537E0A-8726-4355-AA99-06445A43D4D5",
              "versionEndExcluding": "4.6.4",
              "versionStartIncluding": "4.6.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4607385A-CD71-4809-A143-EE2E9DE0F69A",
              "versionEndExcluding": "4.6.4",
              "versionStartIncluding": "4.6.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DEAE12-BC9B-40C5-9D51-25A478670A73",
              "versionEndExcluding": "4.6.4",
              "versionStartIncluding": "4.6.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b3000_firmware:4.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EDCC99-D442-4FC5-B9DC-5CF38B6EE1FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EA9AD80-5B5E-4736-9146-5F58212D2988",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48595C6-E07A-4E74-B695-D6D679B6A3ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3FAB581-A524-4521-A293-84DD106543C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x300b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F075420C-AD43-475E-8398-114AAA4002EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "998569E6-B905-4195-B333-FFFB255EA1FC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48B5B4A-D6E1-478C-B983-FFD1AC9AA4F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "334563F9-7746-48A4-9E37-0AF55F44DC6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "744B2B01-1F28-429F-A898-056470D0DFE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:e750_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F877D5-D386-4390-8B32-E7110C6E7463",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:e750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D3590B0-7F4B-49C2-BE77-57AD27A91018",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE85DAF-B5ED-4D5B-A009-BC7FA2AD0F92",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5BC42BD-03FA-45C1-A7D9-BA9DBE68B7A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1406DB81-E531-4648-B427-AB98793BC76A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB18BA54-1E3A-42DE-A4BD-07A96CE04663",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BD86A8-D5BA-41D8-BA9F-7228DE2C86F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "425AB7BB-4BFC-463F-A0B8-9B1CC7A47FAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "32494D06-2D09-4A26-B9AF-69F0682638D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to information leakage, enabling complete control."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema en ciertos dispositivos GL-iNet, incluidos MT6000, MT3000, MT2500, AXT1800 y AX1800 4.6.2. La interfaz de carga permite cargar archivos arbitrarios al dispositivo. Una vez que el dispositivo ejecuta los archivos, puede provocar una fuga de informaci\u00f3n, lo que permite un control total."
    }
  ],
  "id": "CVE-2024-45263",
  "lastModified": "2025-09-29T15:02:17.183",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-10-24T21:15:12.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "Issue Tracking"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Upload%20to%20ovpn_upload%20via%20Upload%20Interface.md"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-26 20:15
Modified
2025-03-14 14:15
Summary
A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1C6413-DB3D-4B14-9246-38AA5103615D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "861A5EB1-2DFF-479C-9202-590DB6E796C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe3000_firmware:4.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3DD919-EC2B-44CF-AEBD-4EA5A0D52552",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "265EDD5D-B879-4E8A-A6DE-400BC6273A41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD782342-ED71-4BD6-97EB-330F14991957",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:a1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE60C1C-957D-472A-BB66-21DA80B97099",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ax1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED7B3A1-7DEB-4DB0-AA6E-7D27434BD2CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:axt1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C4B6800-8A1B-4522-B5E0-9CC4C09DBA2A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt3000_firmware:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D3F6BA-60D2-495A-8C74-7E74D3DB25A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF2DBFD-2AE0-41BC-B614-9836098119F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "96241919-0E87-4966-B94F-58DA4DFDA607",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:xe300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D82B62-F057-42A4-8530-86145AE91AC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:x750_firmware:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB74B0F-E141-403A-B480-5B48B9040D4E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:x750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1EDFF0-F67C-4801-815C-309940BD7338",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:sft1200_firmware:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE590D9-C0AB-4E3E-8E03-DBF12445AA0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:sft1200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E656351D-E06E-435F-B1E5-34B89FD8B54B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E53CE790-1466-4BB0-933B-33B531C0DD55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F040AC86-5D7A-4E57-B272-A425DDDE1698",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E73FCD-31F7-4BE9-8D16-FB4FDAC685BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3E349B-C40F-4DE6-B977-CF677B2F9814",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "993B06A2-2BB4-4EBC-904E-802001D9DFEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "749A6936-392E-430C-ABD3-33D4C5B3D178",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:ar750s_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8F61AA-DE3B-44DC-AE73-7D8E807F918E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:ar750s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18E5F1D-55CD-4F6A-A349-90DD27B29955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:b1300_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C1EDB92-F871-4F92-B5CB-9DE24A908D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:b1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47EFE3F-D217-469E-BEE6-5D78037C71C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt1300_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0558E6-FAC8-4569-9AA4-C96823E591C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CECA41F-E807-4234-8C41-477DE132210E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5BB0698-5585-4511-88EA-7C265EF22F10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:gl-inet:mt300n-v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "797DD304-0AF8-4E2C-8F72-ADF31B8AD6F4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema de denegaci\u00f3n de servicio en ciertos dispositivos GL-iNet. Algunos sitios web pueden detectar dispositivos expuestos a la red externa a trav\u00e9s de DDNS y, en consecuencia, obtener las direcciones IP y los puertos de los dispositivos que est\u00e1n expuestos. Al utilizar nombres de usuario especiales y caracteres especiales (como medio par\u00e9ntesis o corchetes), se puede llamar a la interfaz de inicio de sesi\u00f3n y provocar que el programa de administraci\u00f3n de sesiones falle, lo que provocar\u00e1 que los clientes no puedan iniciar sesi\u00f3n en sus dispositivos. Esto afecta a MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10 y XE300 4 .3. 16."
    }
  ],
  "id": "CVE-2024-28077",
  "lastModified": "2025-03-14T14:15:14.653",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-08-26T20:15:07.733",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Denial%20of%20service.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://gl-inet.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}