Gl-inet

Gl-ar750s Firmware

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 52.26%
  • Veröffentlicht 12.01.2024 08:15:43
  • Zuletzt bearbeitet 03.06.2025 14:15:34

An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, M...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 12.01.2024 08:15:43
  • Zuletzt bearbeitet 17.06.2025 16:15:27

An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. ...

  • EPSS 0.08%
  • Veröffentlicht 03.01.2024 09:15:09
  • Zuletzt bearbeitet 18.06.2025 16:15:23

An issue was discovered on GL.iNet devices through 4.5.0. Attackers can invoke the add_user interface in the system module to gain root privileges. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT130...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 03.01.2024 08:15:09
  • Zuletzt bearbeitet 03.06.2025 15:15:47

An issue was discovered on GL.iNet devices through 4.5.0. Attackers who are able to steal the AdminToken cookie can execute arbitrary code by uploading a crontab-formatted file to a specific directory and waiting for its execution. This affects A1300...

Exploit
  • EPSS 2.28%
  • Veröffentlicht 28.12.2023 05:15:08
  • Zuletzt bearbeitet 21.11.2024 08:37:00

Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 13.06.2023 17:15:14
  • Zuletzt bearbeitet 21.11.2024 08:05:46

GL.iNET GL-AR750S-Ext firmware v3.215 uses an insecure protocol in its communications which allows attackers to eavesdrop via a man-in-the-middle attack.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 13.06.2023 16:15:13
  • Zuletzt bearbeitet 21.11.2024 08:05:46

GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass ...

Exploit
  • EPSS 2.47%
  • Veröffentlicht 11.05.2023 11:15:09
  • Zuletzt bearbeitet 27.01.2025 18:15:33

An issue was discovered on GL.iNet devices before 3.216. There is an arbitrary file write in which an empty file can be created anywhere on the filesystem. This is caused by a command injection vulnerability with a filter applied. Through the softwar...

Exploit
  • EPSS 23.68%
  • Veröffentlicht 11.05.2023 11:15:09
  • Zuletzt bearbeitet 27.01.2025 18:15:33

An issue was discovered on GL.iNet devices before 3.216. The function guci2_get() found in libglutil.so has a buffer overflow when an item is requested from a UCI context, and the value is pasted into a char pointer to a buffer without checking the s...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 11.05.2023 02:15:09
  • Zuletzt bearbeitet 27.01.2025 18:15:34

A path traversal issue was discovered on GL.iNet devices before 3.216. Through the file sharing feature, it is possible to share an arbitrary directory, such as /tmp or /etc, because there is no server-side restriction to limit sharing to the USB pat...