Client Application Firewall
GL.iNet.Devices.CVE-2024-39226.Port.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in GL.iNet devices.
The vulnerability is due to insufficient validation while handling user-supplied inputs. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target device. Successful exploitation can lead to arbitrary command execution within the context of the system.
Affected Products
GL-iNet MT3000/MT2500/AXT1800/AX1800/A1300/X300B up to v4.5.16
GL-iNet MT6000 up to v4.5.8
GL-iNet X3000/XE3000 up to v4.4.8
GL-iNet XE300 up to v4.3.16
GL-iNet E750 up to v4.3.12
GL-iNet AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 up to v4.3.11
GL-iNet AP1300 up to v3.217
GL-iNet B2200/MV1000/MV1000W/USB150/SF1200/N300/S1300 up to v3.216
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-aug-1-2024/
Version Updates
| Date | Version | Status | Detail |
|---|---|---|---|
| 2024-10-29 | 28.892 |
New
|