Gl-inet

Ar300m16 Firmware

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.96%
  • Veröffentlicht 12.03.2026 18:16:23
  • Zuletzt bearbeitet 16.03.2026 14:18:27

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the module parameter in the M.get_system_log function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 12.03.2026 18:16:22
  • Zuletzt bearbeitet 16.03.2026 14:18:27

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerability via the add_group() function. This vulnerability allows attackers to execute arbitrary SQL database operations via a crafted HTTP request.

Exploit
  • EPSS 0.96%
  • Veröffentlicht 12.03.2026 18:16:22
  • Zuletzt bearbeitet 16.03.2026 14:18:27

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection vulnerabilities in the set_upgrade function via the modem_url, target_version, current_version, firmware_upload, hash_type, hash_value, and upgrade_type parameters. Thes...

Exploit
  • EPSS 0.96%
  • Veröffentlicht 12.03.2026 18:16:22
  • Zuletzt bearbeitet 16.03.2026 14:18:27

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the string port parameter in the enable_echo_server function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

Exploit
  • EPSS 0.96%
  • Veröffentlicht 12.03.2026 00:00:00
  • Zuletzt bearbeitet 13.03.2026 16:02:22

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

  • EPSS 0.08%
  • Veröffentlicht 24.10.2024 21:15:12
  • Zuletzt bearbeitet 29.09.2025 15:02:17

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The upload interface allows the uploading of arbitrary files to the device. Once the device executes the files, it can lead to informatio...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 24.10.2024 21:15:12
  • Zuletzt bearbeitet 15.10.2025 17:54:36

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to e...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 24.10.2024 21:15:12
  • Zuletzt bearbeitet 15.10.2025 17:54:46

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The SID generated for a specific user is not tied to that user itself, which allows other users to potentially use it for authentication....

Exploit
  • EPSS 3.55%
  • Veröffentlicht 24.10.2024 21:15:11
  • Zuletzt bearbeitet 15.10.2025 17:55:07

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. Users who belong to unauthorized groups can invoke any interface of the device, thereby gaining complete control over it.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 24.10.2024 20:15:04
  • Zuletzt bearbeitet 15.10.2025 17:55:27

An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. By intercepting an HTTP request and changing the filename property in the download interface, any file on the device can be deleted.