CVE-2025-67089
BaseFortify
Publication date: 2026-01-08
Last updated on: 2026-01-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gl-inet | gl-axt1800_firmware | 4.2.0 |
| gl-inet | gl-axt1800_firmware | 4.6.4 |
| gl-inet | gl-axt1800_firmware | 4.6.8 |
| gl-inet | gl-axt1800 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw in the GL-iNet GL-AXT1800 router firmware version 4.6.8. It exists in the 'plugins.install_package' RPC method, which does not properly sanitize user input in package names. As a result, an authenticated attacker can exploit this to execute arbitrary commands with root privileges on the device.
How can this vulnerability impact me? :
An attacker who is authenticated on the device can exploit this vulnerability to run arbitrary commands with root privileges. This could lead to full control over the router, allowing the attacker to manipulate device settings, intercept or redirect network traffic, install malicious software, or disrupt network operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should ensure your GL-iNet GL-AXT1800 router firmware is updated to the latest version provided by GL.iNet, as they provide security patches for their products. Additionally, restrict access to the router's RPC methods to trusted users only, and monitor for any unauthorized access attempts. Since the vulnerability requires authentication, ensure strong authentication credentials are used. If a patch is available, apply it promptly. [1]