GL-iNet Routers Exposed to Critical Vulnerabilities: Urgent Firmware Updates Required

GL-iNet Routers vulnerability

GL-iNet has recently issued a security advisory addressing multiple critical vulnerabilities in several of their router models. The vulnerabilities, tracked under CVE-2024-39225 through CVE-2024-39229 and CVE-2024-3661, expose users to severe risks, including unauthenticated remote code execution (RCE) and man-in-the-middle attacks. Users are strongly urged to update their devices to the latest firmware versions to mitigate these threats.

Key Vulnerabilities

  1. CVE-2024-39225 (CVSS 9.8): Unauthenticated Remote Code Execution (RCE)
    • This critical vulnerability allows an unauthenticated attacker to gain RCE as a root user. Exploitation requires precise timing to match the security identifier (SID) during an active session.
  2. CVE-2024-39226 (CVSS 9.8): Missing Input Validation Leading to Arbitrary Code Execution
    • This flaw allows attackers to manipulate routers by passing malicious shell commands through the s2s API, leading to arbitrary code execution.
    • Impact: Full control over the device through command injection.
  3. CVE-2024-39227 (CVSS 9.8): Missing Authorization Checks and Directory Traversal
    • This vulnerability permits direct access via HTTP to execute arbitrary methods within the C library, potentially leading to arbitrary code execution.
    • Impact: Full system compromise via directory traversal and improper JSON data sanitization.
  4. CVE-2024-39228 (CVSS 9.8): Authenticated Remote Code Execution via Ovpn API
    • Attackers can exploit this flaw by passing malicious shell commands through the Ovpn API, resulting in arbitrary code execution.
    • Impact: Full control over the device after authentication through crafted configuration files and API calls.
  5. CVE-2024-39229: DDNS Binding IP Address Modification
    • An issue allowing attackers to intercept communications via man-in-the-middle attacks when DDNS clients report data to the server.
    • Impact: Potential interception and manipulation of network traffic.
  6. CVE-2024-3661 (CVSS 7.6): Tunnelvision Vulnerability via DHCP Option 121
    • This vulnerability allows an attacker on the same local network to read, disrupt, or modify network traffic expected to be protected by a VPN.
    • Impact: Leakage of traffic over the physical interface, undermining VPN security.

Affected Models and Firmware Versions

A wide range of GL-iNet router models are impacted, including popular ones like the Flint, Slate, Brume, and more.

Model Number Affected Firmware Version Resolved Firmware Version
GL-MT6000 Flint 2 V4.5.8 and earlier V4.6.2
GL-A1300 Slate Plus V4.5.16 and earlier V4.5.17
GL-X300B Collie
GL-AX1800 Flint V4.5.16 and earlier V4.6.2
GL-AXT1800 Slate AX
GL-MT2500 Brume 2
GL-MT3000 Beryl AX
GL-X3000 Spitz AX V4.4.8 and earlier V4.4.9
GL-XE3000 Puli AX
GL-XE300 Puli V4.3.16 and earlier V4.3.17
GL-E750/GL-E750V2 Mudi V4.3.12 and earlier V4.3.17
GL-X750 Spitz V4.3.11 and earlier V4.3.17
GL-SFT1200 Opal
GL-AR300M Shadow
GL-AR300M16 Shadow
GL-AR750 Creta
GL-AR750S-EXT Slate
GL-B1300 Convexa-B
GL-MT1300 Beryl
GL-MT300N-V2 Mango
GL-AP1300 Cirrus V3.217 and earlier V3.218
GL-B2200 Velica V3.216 and earlier V3.218
GL-MV1000 Brume
GL-MV1000W Brume-W
GL-USB150 Microuter
GL-SF1200
microuter-N300
GL-S1300 Convexa-S

Mitigating the Risk: Firmware Updates

GL-iNet has released firmware updates that address these vulnerabilities. Users must update their routers to the latest firmware versions as soon as possible to protect their networks from potential attacks. The updated firmware versions can be found on the GL-iNet website.

Related Posts: