First published: Mon Aug 26 2024(Updated: )
A denial-of-service issue was discovered on certain GL-iNet devices. Some websites can detect devices exposed to the external network through DDNS, and consequently obtain the IP addresses and ports of devices that are exposed. By using special usernames and special characters (such as half parentheses or square brackets), one can call the login interface and cause the session-management program to crash, resulting in customers being unable to log into their devices. This affects MT6000 4.5.6, XE3000 4.4.5, X3000 4.4.6, MT3000 4.5.0, MT2500 4.5.0, AXT1800 4.5.0, AX1800 4.5.0, A1300 4.5.0, S200 4.1.4-0300, X750 4.3.7, SFT1200 4.3.7, MT1300 4.3.10, AR750 4.3.10, AR750S 4.3.10, AR300M 4.3.10, AR300M16 4.3.10, B1300 4.3.10, MT300N-V2 4.3.10, and XE300 4.3.16.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
GL-iNet MT6000 firmware | =4.5.6 | |
GL.iNet MT6000 | ||
All of | ||
GL.iNet GL-X3000 Firmware | =4.4.6 | |
GL.iNet GL-X3000 Firmware | ||
All of | ||
GL-iNet XE3000 firmware | =4.4.4 | |
GL-iNet XE3000 firmware | ||
All of | ||
GL.iNet A1300 firmware | =4.5.0 | |
GL-iNet A1300 firmware | ||
All of | ||
Netgear Nighthawk AX1800 Firmware | =4.5.0 | |
GL.iNet GL-AX1800 | ||
All of | ||
GL.iNET GL-AXT1800 | =4.5.0 | |
GL-iNet AXT1800 firmware | ||
All of | ||
GL.iNet MT2500 firmware | =4.5.0 | |
GL.iNet MT2500 firmware | ||
All of | ||
GL.iNet MT3000 Firmware | =4.5.0 | |
GL.iNet MT3000 Firmware | ||
All of | ||
GL.iNet XE300 firmware | =4.3.16 | |
GL-iNet XE300 firmware | ||
All of | ||
GL.iNet X750 firmware | =4.3.7 | |
GL.iNet X750 | ||
All of | ||
GL.iNet SFT1200 firmware | =4.3.7 | |
GL.iNet SFT1200 firmware | ||
All of | ||
GL.iNet GL-AR300M | =4.3.10 | |
GL.iNet GL-AR300M | ||
All of | ||
GL.iNet AR300M16 firmware | =4.3.10 | |
GL.iNet AR300M16 firmware | ||
All of | ||
GL.iNet AR750 Firmware | =4.3.10 | |
GL.iNet AR750 Firmware | ||
All of | ||
GL.iNet GL-AR750S Firmware | =4.3.10 | |
GL.iNet AR750S | ||
All of | ||
GL.iNet B1300 firmware | =4.3.10 | |
GL.iNet B1300 firmware | ||
All of | ||
GL.iNet GL-MT1300 Firmware | =4.3.10 | |
GL.iNet GL-MT1300 Beryl | ||
All of | ||
GL.iNet MT300N-V2 firmware | =4.3.10 | |
GL-iNet MT300N-V2 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28077 is classified as a denial-of-service vulnerability on certain GL-iNet devices.
To fix CVE-2024-28077, you should update your vulnerable GL-iNet device firmware to the latest version provided by the manufacturer.
CVE-2024-28077 affects multiple models including GL-iNet MT6000, X3000, XE3000, A1300, AX1800, AXT1800, MT2500, MT3000, and others with specific firmware versions.
CVE-2024-28077 may allow attackers to discover device IP addresses and ports through specially crafted requests, leading to potential denial-of-service conditions.
While a specific workaround isn't detailed for CVE-2024-28077, limiting external network exposure may help mitigate risk until a firmware update is available.