First published: Tue Aug 06 2024(Updated: )
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
GL.iNet MT6000 | ||
GL-iNet MT6000 firmware | =4.5.8 | |
All of | ||
GL-iNet A1300 firmware | ||
GL.iNet A1300 firmware | =4.5.16 | |
All of | ||
GL-iNet X300B firmware | ||
GL.iNet X300B firmware | =4.5.16 | |
All of | ||
GL.iNet GL-AX1800 | ||
Netgear Nighthawk AX1800 Firmware | =4.5.16 | |
All of | ||
GL-iNet AXT1800 firmware | ||
GL.iNET GL-AXT1800 | =4.5.16 | |
All of | ||
GL.iNet MT2500 firmware | ||
GL.iNet MT2500 firmware | =4.5.16 | |
All of | ||
GL.iNet MT3000 Firmware | =4.5.16 | |
GL.iNet MT3000 Firmware | ||
All of | ||
GL.iNet GL-X3000 Firmware | ||
GL.iNet GL-X3000 Firmware | =4.4.8 | |
All of | ||
GL-iNet XE3000 firmware | =4.4.8 | |
GL-iNet XE3000 firmware | ||
All of | ||
GL.iNet XE300 firmware | =4.3.16 | |
GL-iNet XE300 firmware | ||
All of | ||
GL.iNet GL-E750 | =4.3.12 | |
GL-iNet E750 firmware | ||
All of | ||
GL.iNet X750 firmware | =4.3.11 | |
GL.iNet X750 | ||
All of | ||
GL.iNet SFT1200 firmware | =4.3.11 | |
GL.iNet SFT1200 firmware | ||
All of | ||
GL.iNet GL-AR300M | =4.3.11 | |
GL.iNet GL-AR300M | ||
All of | ||
GL.iNet AR300M16 firmware | =4.3.11 | |
GL.iNet AR300M16 firmware | ||
All of | ||
GL.iNet AR750 Firmware | =4.3.11 | |
GL.iNet AR750 Firmware | ||
All of | ||
GL.iNet GL-AR750S Firmware | =4.3.11 | |
GL.iNet AR750S | ||
All of | ||
GL.iNet B1300 firmware | =4.3.11 | |
GL.iNet B1300 firmware | ||
All of | ||
GL.iNet GL-MT1300 Firmware | =4.3.11 | |
GL.iNet GL-MT1300 Beryl | ||
All of | ||
GL.iNet MT300N-V2 firmware | =4.3.11 | |
GL-iNet MT300N-V2 firmware | ||
All of | ||
GL.iNet AP1300 Firmware | =3.217 | |
GL-iNet AP1300 firmware | ||
All of | ||
GL.iNet GL-B2200 Firmware | =3.216 | |
GL-iNet B2200 firmware | ||
All of | ||
GL.iNet MV1000 firmware | =3.216 | |
GL.iNet MV1000 | ||
All of | ||
GL.iNet GL-MV1000W | =3.216 | |
GL.iNet GL-MV1000W | ||
All of | ||
GL.iNet USB150 firmware | =3.216 | |
GL-iNet USB150 firmware | ||
All of | ||
GL.iNet SFT1200 firmware | =3.216 | |
GL-iNet SF1200 firmware | ||
All of | ||
GL.iNet MiRouter-N300 Firmware | =3.216 | |
GL-iNet N300 firmware | ||
All of | ||
GL.iNet GL-S1300 Firmware | =3.216 | |
GL-iNet S1300 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39226 is classified as a significant security vulnerability due to its potential to manipulate router functionalities.
To remediate CVE-2024-39226, update the affected GL-iNet devices to the latest firmware version provided by the manufacturer.
CVE-2024-39226 affects various GL-iNet router models, specifically those running firmware versions 4.3.11, 4.3.12, 4.3.13, 4.3.16, and 4.5.16.
Yes, CVE-2024-39226 can be exploited to manipulate routers, potentially allowing attackers unauthorized access to the network and its resources.
CVE-2024-39226 is considered a remote vulnerability since it can be exploited over the network without requiring physical access to the affected device.