First published: Fri Jan 12 2024(Updated: )
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Netgear Nighthawk AX1800 Firmware | =4.3.7 | |
Netgear Nighthawk AX1800 Firmware | =4.4.6 | |
GL.iNet GL-AX1800 | ||
All of | ||
Any of | ||
gl-inet gl-axt1800 | =4.3.7 | |
gl-inet gl-axt1800 | =4.4.6 | |
GL.iNet GL-AX1800 | ||
All of | ||
Any of | ||
GL.iNet GL-MT3000 Firmware | =4.3.7 | |
GL.iNet GL-MT3000 Firmware | =4.4.6 | |
GL.iNet GL-MT3000 | ||
All of | ||
Any of | ||
GL.iNet GL-MT2500 | =4.3.7 | |
GL.iNet GL-MT2500 | =4.4.6 | |
GL.iNet GL-MT2500 | ||
All of | ||
Any of | ||
GL.iNet GL-MT6000 | =4.3.7 | |
GL.iNet GL-MT6000 | =4.4.6 | |
GL.iNet GL-MT6000 | ||
All of | ||
Any of | ||
GL.iNet GL-MT1300 Firmware | =4.3.7 | |
GL.iNet GL-MT1300 Firmware | =4.4.6 | |
GL.iNet GL-MT1300 | ||
All of | ||
Any of | ||
GL.iNet GL-MT300N-V2 Firmware | =4.3.7 | |
GL.iNet GL-MT300N-V2 Firmware | =4.4.6 | |
gl-inet gl-mt300n-v2 firmware | ||
All of | ||
Any of | ||
GL.iNet GL-AR750 Firmware | =4.3.7 | |
GL.iNet GL-AR750 Firmware | =4.4.6 | |
GL.iNet GL-AR750 Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-AR750 Firmware | =4.3.7 | |
GL.iNet GL-AR750 Firmware | =4.4.6 | |
GL.iNet GL-AR750 Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-AR300M Firmware | =4.3.7 | |
GL.iNet GL-AR300M Firmware | =4.4.6 | |
GL.iNet GL-AR300M Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-B1300 Firmware | =4.3.7 | |
GL.iNet GL-B1300 Firmware | =4.4.6 | |
GL.iNet GL-B1300 Firmware | ||
All of | ||
Any of | ||
GL.iNet GL-A1300 Firmware | =4.3.7 | |
GL.iNet GL-A1300 Firmware | =4.4.6 | |
GL.iNet GL-A1300 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50919 is classified as a high-severity vulnerability due to the potential for unauthorized access.
To mitigate CVE-2023-50919, upgrade your GL.iNet devices to firmware version 4.5.0 or later.
CVE-2023-50919 affects GL.iNet devices running versions before 4.5.0, including A1300, AX1800, and MT3000 among others.
CVE-2023-50919 exploits NGINX authentication through Lua string pattern matching, allowing bypass of access controls.
While upgrading is recommended, there are no reliable workarounds available for CVE-2023-50919.