Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
10 vulnerabilities found for usb150_firmware by gl-inet
CVE-2024-39229 (GCVE-0-2024-39229)
Vulnerability from nvd – Published: 2024-08-06 00:00 – Updated: 2024-11-21 18:43
VLAI?
Summary
An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39229",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T15:41:13.508119Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-924",
"description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T18:43:08.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:34:59.730Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39229",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-11-21T18:43:08.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39227 (GCVE-0-2024-39227)
Vulnerability from nvd – Published: 2024-08-06 00:00 – Updated: 2024-08-15 15:40
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-mt2500:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt2500",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-axt1800:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-axt1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ax1800:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ax1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-a1300:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-a1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-x300b:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-xe300:4.3.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-e750:4.3.12:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-e750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.12"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ap1300:4.3.13:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ap1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.13"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-s1300:4.3.13:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-s1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.13"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-xe3000:4.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-x3000:4.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar750:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar750s:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar750s",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar300m:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar300m",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar300m16:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar300m16",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar300n-v2:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar300n-v2",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-b1300:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-mt1300:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-sft1200:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-sft1200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-x750:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-mt3000:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39227",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-07T14:01:03.559592Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-75",
"description": "CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-07T14:56:43.943Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:40:35.188Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39227",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-08-15T15:40:35.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39228 (GCVE-0-2024-39228)
Vulnerability from nvd – Published: 2024-08-06 00:00 – Updated: 2024-08-15 15:36
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sft1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m16_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750s_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt300n-v2_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ap1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.217"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b2200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000w_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "usb150_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sf1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "n300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.5.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "a1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ax1800_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt2500_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe300_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "e750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.12"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39228",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T14:17:52.681206Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T14:46:57.158Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:36:52.684Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39228",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-08-15T15:36:52.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39226 (GCVE-0-2024-39226)
Vulnerability from nvd – Published: 2024-08-06 00:00 – Updated: 2024-11-12 17:08
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
Severity ?
4.3 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39226",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-16T16:17:15.444790Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-12T17:08:43.264Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:44:08.680Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39226",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-11-12T17:08:43.264Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39225 (GCVE-0-2024-39225)
Vulnerability from nvd – Published: 2024-08-06 00:00 – Updated: 2024-08-15 15:31
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "a1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ax1800_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "axt1800_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt2500_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "e750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.12"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sft1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m16_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750s_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt300n-v2_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ap1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.217"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b2200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000w_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "usb150_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sf1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "n300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39225",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T14:48:57.143782Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T15:09:56.428Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:31:54.275Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39225",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-08-15T15:31:54.275Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39226 (GCVE-0-2024-39226)
Vulnerability from cvelistv5 – Published: 2024-08-06 00:00 – Updated: 2024-11-12 17:08
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API.
Severity ?
4.3 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39226",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-16T16:17:15.444790Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-12T17:08:43.264Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a vulnerability can be exploited to manipulate routers by passing malicious shell commands through the s2s API."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:44:08.680Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/s2s%20interface%20shell%20injection.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39226",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-11-12T17:08:43.264Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39225 (GCVE-0-2024-39225)
Vulnerability from cvelistv5 – Published: 2024-08-06 00:00 – Updated: 2024-08-15 15:31
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "a1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ax1800_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "axt1800_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt2500_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe3000_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "e750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.12"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sft1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m16_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750s_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt300n-v2_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ap1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.217"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b2200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000w_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "usb150_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sf1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "n300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39225",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T14:48:57.143782Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307 Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T15:09:56.428Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:31:54.275Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Bypass%20the%20login%20mechanism.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39225",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-08-15T15:31:54.275Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39228 (GCVE-0-2024-39228)
Vulnerability from cvelistv5 – Published: 2024-08-06 00:00 – Updated: 2024-08-15 15:36
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:gl-inet:x750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sft1200_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sft1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar300m16_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ar750s_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ar750s_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt1300_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt300n-v2_firmware:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt300n-v2_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ap1300_firmware:3.217:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ap1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.217"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:b2200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "b2200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mv1000w_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mv1000w_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:usb150_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "usb150_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:sf1200_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "sf1200_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:n300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "n300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:s1300_firmware:3.216:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "s1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "3.216"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:gl-mt6000_firmware:4.5.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt6000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "a1300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x300b_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ax1800_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt2500_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:mt3000_firmware:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mt3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "x3000_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe300_firmware:4.4.8:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4.8"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:xe300_firmware:4.3.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xe300_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.16"
}
]
},
{
"cpes": [
"cpe:2.3:o:gl-inet:e750_firmware:4.3.12:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "e750_firmware",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.12"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39228",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T14:17:52.681206Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T14:46:57.158Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config and check_config."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:36:52.684Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Ovpn%20interface%20shell%20injection.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39228",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-08-15T15:36:52.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39229 (GCVE-0-2024-39229)
Vulnerability from cvelistv5 – Published: 2024-08-06 00:00 – Updated: 2024-11-21 18:43
VLAI?
Summary
An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server.
Severity ?
6.5 (Medium)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39229",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T15:41:13.508119Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-924",
"description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T18:43:08.245Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue in GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, XE3000/X3000 v4, and B2200/MV1000/MV1000W/USB150/N300/SF1200 v3.216 allows attackers to intercept communications via a man-in-the-middle attack when DDNS clients are reporting data to the server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:34:59.730Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/DDNS%20data%20is%20not%20encrypted.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39229",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-11-21T18:43:08.245Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39227 (GCVE-0-2024-39227)
Vulnerability from cvelistv5 – Published: 2024-08-06 00:00 – Updated: 2024-08-15 15:40
VLAI?
Summary
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-mt2500:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt2500",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-axt1800:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-axt1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ax1800:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ax1800",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-a1300:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-a1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-x300b:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x300b",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-xe300:4.3.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.16"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-e750:4.3.12:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-e750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.12"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ap1300:4.3.13:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ap1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.13"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-s1300:4.3.13:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-s1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.13"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-xe3000:4.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-xe3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-x3000:4.4:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.4"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar750:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar750s:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar750s",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar300m:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar300m",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar300m16:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar300m16",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-ar300n-v2:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-ar300n-v2",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-b1300:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-b1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-mt1300:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt1300",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-sft1200:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-sft1200",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-x750:4.3.11:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-x750",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.3.11"
}
]
},
{
"cpes": [
"cpe:2.3:a:gl-inet:gl-mt3000:4.5.16:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gl-mt3000",
"vendor": "gl-inet",
"versions": [
{
"status": "affected",
"version": "4.5.16"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-39227",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-07T14:01:03.559592Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-75",
"description": "CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-07T14:56:43.943Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T15:40:35.188Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Access%20to%20the%20C%20library%20without%20logging%20in.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-39227",
"datePublished": "2024-08-06T00:00:00.000Z",
"dateReserved": "2024-06-21T00:00:00.000Z",
"dateUpdated": "2024-08-15T15:40:35.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}