An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.
References
| Link | Resource |
|---|---|
| https://aleksazatezalo.medium.com/critical-authentication-bypass-vulnerability-in-gl-inet-gl-axt1800-router-firmware-f19442ca721d | Exploit Third Party Advisory Press/Media Coverage |
| https://aleksazatezalo.medium.com/critical-command-injection-vulnerability-in-gl-inet-gl-axt1800-router-firmware-e6d67d81ee51?postPublishedType=repub | Exploit Third Party Advisory Press/Media Coverage |
| https://www.gl-inet.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 16:15
Updated : 2026-01-16 21:28
NVD link : CVE-2025-67091
Mitre link : CVE-2025-67091
CVE.ORG link : CVE-2025-67091
JSON object : View
Products Affected
gl-inet
- ax1800
- ax1800_firmware
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
