CVE-2026-26794
SQL Injection in GL-iNet GL-AR300M16 Allows Database Manipulation
Publication date: 2026-03-12
Last updated on: 2026-03-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gl-inet | ar300m16_firmware | 4.3.11 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-26794 is a SQL injection vulnerability found in the GL-iNet GL-AR300M16 router firmware version 4.3.11. The issue exists in the add_group() function, which insecurely constructs SQL queries by directly incorporating user input without proper sanitization or parameterization.'}, {'type': 'paragraph', 'content': "An attacker can exploit this vulnerability by sending a specially crafted HTTP JSON-RPC request to the router's /rpc endpoint. This request injects malicious SQL commands within the group parameter of the add_group method, allowing arbitrary SQL database operations to be executed."}, {'type': 'paragraph', 'content': 'For example, the attacker can attach an external database, create new tables, and insert arbitrary data, demonstrating the ability to execute arbitrary SQL commands remotely on the device.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability allows remote attackers to execute arbitrary SQL commands on the GL-AR300M16 router's database. This can lead to unauthorized data manipulation, data leakage, or corruption of the router's configuration and access control data."}, {'type': 'paragraph', 'content': "Exploitation could compromise the integrity and availability of the router's database, potentially disrupting network operations or allowing further attacks through manipulated access controls."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability can be detected by sending a crafted HTTP JSON-RPC POST request to the router's /rpc endpoint targeting the add_group method with a malicious payload in the group parameter."}, {'type': 'paragraph', 'content': 'An example detection approach involves using a Python script with the requests library to send a JSON body containing SQL injection payloads that attempt to execute arbitrary SQL commands.'}, {'type': 'paragraph', 'content': 'The payload can include SQL commands such as attaching an external database, creating a new table, and inserting data to confirm successful exploitation.'}, {'type': 'paragraph', 'content': 'The HTTP request must include appropriate headers mimicking a legitimate browser request and an admin authentication cookie adjusted to the target environment.'}, {'type': 'paragraph', 'content': 'No specific command-line tools or network scanning commands are provided, but the detection relies on sending crafted HTTP POST requests to the affected endpoint and analyzing the response or side effects.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
I don't know