CVE-2025-67089
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-08

Last updated on: 2026-01-16

Assigner: MITRE

Description
A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands with root privileges
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-08
Last Modified
2026-01-16
Generated
2026-05-07
AI Q&A
2026-01-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
gl-inet gl-axt1800_firmware 4.2.0
gl-inet gl-axt1800_firmware 4.6.4
gl-inet gl-axt1800_firmware 4.6.8
gl-inet gl-axt1800 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a command injection flaw in the GL-iNet GL-AXT1800 router firmware version 4.6.8. It exists in the 'plugins.install_package' RPC method, which does not properly sanitize user input in package names. As a result, an authenticated attacker can exploit this to execute arbitrary commands with root privileges on the device.


How can this vulnerability impact me? :

An attacker who is authenticated on the device can exploit this vulnerability to run arbitrary commands with root privileges. This could lead to full control over the router, allowing the attacker to manipulate device settings, intercept or redirect network traffic, install malicious software, or disrupt network operations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should ensure your GL-iNet GL-AXT1800 router firmware is updated to the latest version provided by GL.iNet, as they provide security patches for their products. Additionally, restrict access to the router's RPC methods to trusted users only, and monitor for any unauthorized access attempts. Since the vulnerability requires authentication, ensure strong authentication credentials are used. If a patch is available, apply it promptly. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart