CWE
384
Advisory Published
Updated

CVE-2023-50920

First published: Fri Jan 12 2024(Updated: )

An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
All of
Any of
Netgear Nighthawk AX1800 Firmware=4.3.7
Netgear Nighthawk AX1800 Firmware=4.4.6
GL.iNet GL-AX1800
All of
Any of
gl-inet gl-axt1800=4.3.7
gl-inet gl-axt1800=4.4.6
GL.iNet GL-AX1800
All of
Any of
GL.iNet GL-MT3000 Firmware=4.3.7
GL.iNet GL-MT3000 Firmware=4.4.6
GL.iNet GL-MT3000
All of
Any of
GL.iNet GL-MT2500=4.3.7
GL.iNet GL-MT2500=4.4.6
GL.iNet GL-MT2500
All of
Any of
GL.iNet GL-MT6000=4.3.7
GL.iNet GL-MT6000=4.4.6
GL.iNet GL-MT6000
All of
Any of
GL.iNet GL-MT1300 Firmware=4.3.7
GL.iNet GL-MT1300 Firmware=4.4.6
GL.iNet GL-MT1300
All of
Any of
GL.iNet GL-MT300N-V2 Firmware=4.3.7
GL.iNet GL-MT300N-V2 Firmware=4.4.6
gl-inet gl-mt300n-v2 firmware
All of
Any of
GL.iNet GL-AR750 Firmware=4.3.7
GL.iNet GL-AR750 Firmware=4.4.6
GL.iNet GL-AR750 Firmware
All of
Any of
GL.iNet GL-AR750 Firmware=4.3.7
GL.iNet GL-AR750 Firmware=4.4.6
GL.iNet GL-AR750 Firmware
All of
Any of
GL.iNet GL-AR300M Firmware=4.3.7
GL.iNet GL-AR300M Firmware=4.4.6
GL.iNet GL-AR300M Firmware
All of
Any of
GL.iNet GL-B1300 Firmware=4.3.7
GL.iNet GL-B1300 Firmware=4.4.6
GL.iNet GL-B1300 Firmware
All of
Any of
GL.iNet GL-A1300 Firmware=4.3.7
GL.iNet GL-A1300 Firmware=4.4.6
GL.iNet GL-A1300 Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2023-50920?

    CVE-2023-50920 is considered a high severity vulnerability due to the risk of unauthorized access by attackers.

  • How do I fix CVE-2023-50920?

    To fix CVE-2023-50920, upgrade your GL.iNet device firmware to version 4.5.0 or later.

  • Which devices are affected by CVE-2023-50920?

    CVE-2023-50920 affects GL.iNet devices running firmware versions prior to 4.5.0.

  • What type of vulnerability is CVE-2023-50920?

    CVE-2023-50920 is an authentication bypass vulnerability allowing attackers to impersonate legitimate users.

  • Can attackers exploit CVE-2023-50920 remotely?

    Yes, attackers can exploit CVE-2023-50920 remotely by sharing session identifiers between different user sessions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203