First published: Thu Oct 24 2024(Updated: )
An issue was discovered on certain GL-iNet devices, including MT6000, MT3000, MT2500, AXT1800, and AX1800 4.6.2. The params parameter in the call method of the /rpc endpoint is vulnerable to arbitrary directory traversal, which enables attackers to execute scripts under any path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GL.iNet MT6000 | ||
GL.iNet MT3000 Firmware | ||
GL.iNet MT2500 firmware | ||
GL-iNet AXT1800 firmware | ||
GL.iNet GL-AX1800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45262 is considered a high-severity vulnerability due to its potential for arbitrary script execution.
To fix CVE-2024-45262, you should update your GL-iNet devices to the latest firmware version that addresses this vulnerability.
CVE-2024-45262 affects several GL-iNet devices including MT6000, MT3000, MT2500, AXT1800, and AX1800.
CVE-2024-45262 is a directory traversal vulnerability that allows attackers to execute unauthorized scripts.
Yes, CVE-2024-45262 can be exploited remotely if the device is exposed to the internet.