First published: Thu Dec 28 2023(Updated: )
Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
GL.iNet GL-MT1300 | ||
GL.iNet GL-MT1300 Firmware | =4.3.7 | |
All of | ||
gl-inet gl-mt300n-v2 firmware | ||
GL.iNet GL-MT300N-V2 Firmware | =4.3.7 | |
All of | ||
GL.iNet GL-AR750 Firmware | ||
GL.iNet GL-AR750 Firmware | =4.3.7 | |
All of | ||
GL.iNet GL-AR750 Firmware | ||
GL.iNet GL-AR750 Firmware | =4.3.7 | |
All of | ||
GL.iNet GL-AR300M Firmware | ||
GL.iNet GL-AR300M Firmware | =4.3.7 | |
All of | ||
GL.iNet GL-B1300 Firmware | ||
GL.iNet GL-B1300 Firmware | =4.3.7 | |
All of | ||
GL.iNet GL-MT6000 | ||
GL.iNet GL-MT6000 | =4.5.0 | |
All of | ||
GL.iNet GL-A1300 Firmware | =4.4.6 | |
GL.iNet GL-A1300 Firmware | ||
All of | ||
Netgear Nighthawk AX1800 Firmware | =4.4.6 | |
GL.iNet GL-AX1800 | ||
All of | ||
gl-inet gl-axt1800 | =4.4.6 | |
GL.iNet GL-AX1800 | ||
All of | ||
GL.iNet GL-MT3000 Firmware | =4.4.6 | |
GL.iNet GL-MT3000 | ||
All of | ||
GL.iNet GL-MT2500 | =4.4.6 | |
GL.iNet GL-MT2500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50445 has been assigned a severity rating due to its potential for local code execution via shell injection.
To fix CVE-2023-50445, update to the latest firmware version provided by GL.iNet that addresses this vulnerability.
Devices affected by CVE-2023-50445 include GL.iNet A1300 v4.4.6, AX1800 v4.4.6, MT3000 v4.4.6, and several other models, primarily those with specific firmware versions.
CVE-2023-50445 requires local access to the device, which limits its exploitation level to users with physical access.
Exploiting CVE-2023-50445 can allow an attacker to execute arbitrary commands on the vulnerable device, potentially compromising its functionality and security.