Unknown
CVE-2024-39227
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2024-39227
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain insecure permissions in the endpoint /cgi-bin/glc. This vulnerability allows unauthenticated attackers to execute arbitrary code or possibly a directory traversal via crafted JSON data.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- a1300 firmware 4.5.16,
- ap1300 firmware 3.217,
- ar300m firmware 4.3.11,
- ar300m16 firmware 4.3.11,
- ar750 firmware 4.3.11,
- ar750s firmware 4.3.11,
- ax1800 firmware 4.5.16,
- axt1800 firmware 4.5.16,
- b1300 firmware 4.3.11,
- b2200 firmware 3.216,
- e750 firmware 4.3.12,
- mt1300 firmware 4.3.11,
- mt2500 firmware 4.5.16,
- mt3000 firmware 4.5.16,
- mt300n-v2 firmware 4.3.11,
- mt6000 firmware 4.5.8,
- mv1000 firmware 3.216,
- mv1000w firmware 3.216,
- n300 firmware 3.216,
- s1300 firmware 3.216,
- sf1200 firmware 3.216,
- sft1200 firmware 4.3.11,
- usb150 firmware 3.216,
- x3000 firmware 4.4.8,
- x300b firmware 4.5.16,
- x750 firmware 4.3.11,
- xe300 firmware 4.3.16,
- xe3000 firmware 4.4.8
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: