A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vulnerability is present in the `plugins.install_package` RPC method, which fails to properly sanitize user input in package names. Authenticated attackers can exploit this to execute arbitrary commands with root privileges
References
| Link | Resource |
|---|---|
| https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub | Exploit Third Party Advisory Press/Media Coverage |
| https://www.gl-inet.com/security-updates/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 16:15
Updated : 2026-01-16 21:26
NVD link : CVE-2025-67089
Mitre link : CVE-2025-67089
CVE.ORG link : CVE-2025-67089
JSON object : View
Products Affected
gl-inet
- gl-axt1800
- gl-axt1800_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
