CVE-2026-26794
Received Received - Intake
SQL Injection in GL-iNet GL-AR300M16 Allows Database Manipulation

Publication date: 2026-03-12

Last updated on: 2026-03-16

Assigner: MITRE

Description
GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerability via the add_group() function. This vulnerability allows attackers to execute arbitrary SQL database operations via a crafted HTTP request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-12
Last Modified
2026-03-16
Generated
2026-05-07
AI Q&A
2026-03-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gl-inet ar300m16_firmware 4.3.11
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-26794 is a SQL injection vulnerability found in the GL-iNet GL-AR300M16 router firmware version 4.3.11. The issue exists in the add_group() function, which insecurely constructs SQL queries by directly incorporating user input without proper sanitization or parameterization.'}, {'type': 'paragraph', 'content': "An attacker can exploit this vulnerability by sending a specially crafted HTTP JSON-RPC request to the router's /rpc endpoint. This request injects malicious SQL commands within the group parameter of the add_group method, allowing arbitrary SQL database operations to be executed."}, {'type': 'paragraph', 'content': 'For example, the attacker can attach an external database, create new tables, and insert arbitrary data, demonstrating the ability to execute arbitrary SQL commands remotely on the device.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability allows remote attackers to execute arbitrary SQL commands on the GL-AR300M16 router's database. This can lead to unauthorized data manipulation, data leakage, or corruption of the router's configuration and access control data."}, {'type': 'paragraph', 'content': "Exploitation could compromise the integrity and availability of the router's database, potentially disrupting network operations or allowing further attacks through manipulated access controls."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by sending a crafted HTTP JSON-RPC POST request to the router's /rpc endpoint targeting the add_group method with a malicious payload in the group parameter."}, {'type': 'paragraph', 'content': 'An example detection approach involves using a Python script with the requests library to send a JSON body containing SQL injection payloads that attempt to execute arbitrary SQL commands.'}, {'type': 'paragraph', 'content': 'The payload can include SQL commands such as attaching an external database, creating a new table, and inserting data to confirm successful exploitation.'}, {'type': 'paragraph', 'content': 'The HTTP request must include appropriate headers mimicking a legitimate browser request and an admin authentication cookie adjusted to the target environment.'}, {'type': 'paragraph', 'content': 'No specific command-line tools or network scanning commands are provided, but the detection relies on sending crafted HTTP POST requests to the affected endpoint and analyzing the response or side effects.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart