NA

CVE-2023-50445

Published: 28/12/2023 Updated: 24/01/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local malicious users to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module.

Vulnerable Product Search on Vulmon Subscribe to Product

gl-inet gl-mt1300_firmware 4.3.7

gl-inet gl-mt300n-v2_firmware 4.3.7

gl-inet gl-ar750s_firmware 4.3.7

gl-inet gl-ar750_firmware 4.3.7

gl-inet gl-ar300m_firmware 4.3.7

gl-inet gl-b1300_firmware 4.3.7

gl-inet gl-mt6000_firmware 4.5.0

gl-inet gl-a1300_firmware 4.4.6

gl-inet gl-ax1800_firmware 4.4.6

gl-inet gl-axt1800_firmware 4.4.6

gl-inet gl-mt3000_firmware 4.4.6

gl-inet gl-mt2500_firmware 4.4.6

Vendor Advisories

Check Point Reference: CPAI-2023-1563 Date Published: 29 Feb 2024 Severity: High ...

Exploits

A command injection vulnerability exists in multiple GLiNet network products, allowing an attacker to inject and execute arbitrary shell commands via JSON parameters at the gl_system_log and gl_crash_log interface in the logread module This Metasploit exploit requires post-authentication using the Admin-Token cookie/sessionID (SID), typically sto ...