First published: Tue Aug 06 2024(Updated: )
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
GL-iNet MT6000 firmware | =4.5.8 | |
GL.iNet MT6000 | ||
All of | ||
GL.iNet A1300 firmware | =4.5.16 | |
GL-iNet A1300 firmware | ||
All of | ||
GL.iNet X300B firmware | =4.5.16 | |
GL-iNet X300B firmware | ||
All of | ||
Netgear Nighthawk AX1800 Firmware | =4.5.16 | |
GL.iNet GL-AX1800 | ||
All of | ||
GL.iNET GL-AXT1800 | =4.5.16 | |
GL-iNet AXT1800 firmware | ||
All of | ||
GL.iNet MT2500 firmware | =4.5.16 | |
GL.iNet MT2500 firmware | ||
All of | ||
GL.iNet MT3000 Firmware | =4.5.16 | |
GL.iNet MT3000 Firmware | ||
All of | ||
GL.iNet GL-X3000 Firmware | =4.4.8 | |
GL.iNet GL-X3000 Firmware | ||
All of | ||
GL-iNet XE3000 firmware | =4.4.8 | |
GL-iNet XE3000 firmware | ||
All of | ||
GL.iNet XE300 firmware | =4.3.16 | |
GL-iNet XE300 firmware | ||
All of | ||
GL.iNet GL-E750 | =4.3.12 | |
GL-iNet E750 firmware | ||
All of | ||
GL.iNet X750 firmware | =4.3.11 | |
GL.iNet X750 | ||
All of | ||
GL.iNet SFT1200 firmware | =4.3.11 | |
GL.iNet SFT1200 firmware | ||
All of | ||
GL.iNet GL-AR300M | =4.3.11 | |
GL.iNet GL-AR300M | ||
All of | ||
GL.iNet AR300M16 firmware | =4.3.11 | |
GL.iNet AR300M16 firmware | ||
All of | ||
GL.iNet AR750 Firmware | =4.3.11 | |
GL.iNet AR750 Firmware | ||
All of | ||
GL.iNet GL-AR750S Firmware | =4.3.11 | |
GL.iNet AR750S | ||
All of | ||
GL.iNet B1300 firmware | =4.3.11 | |
GL.iNet B1300 firmware | ||
All of | ||
GL.iNet GL-MT1300 Firmware | =4.3.11 | |
GL.iNet GL-MT1300 Beryl | ||
All of | ||
GL.iNet MT300N-V2 firmware | =4.3.11 | |
GL-iNet MT300N-V2 firmware | ||
All of | ||
GL.iNet AP1300 Firmware | =3.217 | |
GL-iNet AP1300 firmware | ||
All of | ||
GL.iNet GL-B2200 Firmware | =3.216 | |
GL-iNet B2200 firmware | ||
All of | ||
GL.iNet MV1000 firmware | =3.216 | |
GL.iNet MV1000 | ||
All of | ||
GL.iNet GL-MV1000W | =3.216 | |
GL.iNet GL-MV1000W | ||
All of | ||
GL.iNet USB150 firmware | =3.216 | |
GL-iNet USB150 firmware | ||
All of | ||
GL.iNet SFT1200 firmware | =3.216 | |
GL-iNet SF1200 firmware | ||
All of | ||
GL.iNet MiRouter-N300 Firmware | =3.216 | |
GL-iNet N300 firmware | ||
All of | ||
GL.iNet GL-S1300 Firmware | =3.216 | |
GL-iNet S1300 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39227 has been categorized as a significant security vulnerability due to insecure permissions in critical endpoints.
To mitigate CVE-2024-39227, update your GL-iNet product firmware to the latest version released by the manufacturer that addresses this vulnerability.
CVE-2024-39227 affects various GL-iNet models including AR750, AR750S, and multiple others running specific firmware versions.
Exploitation of CVE-2024-39227 could lead to unauthorized access and manipulation of system configurations or sensitive data.
While a firmware update is the recommended fix for CVE-2024-39227, temporarily limiting exposure of the affected devices to the internet may serve as a temporary workaround.