GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code


A recent analysis of the GL-AX1800 router by researchers revealed the presence of several security vulnerabilities that attackers could exploit to gain remote access and unauthorized access to restricted files. 

If these vulnerabilities are not fixed, they could potentially result in significant security breaches. It is imperative to address them promptly to prevent any potential damage.

During their security assessment, Hadess security researchers discovered a vulnerability identified as CVE-2023-47464 in GL-AX1800 routers.

The GL-AX1800 is a dual-band router that uses Wi-Fi 6 technology to support high-speed data transmission, mass device connectivity, and ultra-low latency gaming. 

It is designed to meet the demanding needs of users who require fast and reliable connectivity for their heavy-duty applications. 

Attack Vectors With GL-AX1800 Router

  • Susceptible to CSRF attacks
  • Permits insecure file uploads
  • Suffers path traversal vulnerability
  • File overwrite vulnerability leads to RCE
  • Unrestricted File Access Download

As highlighted by researchers, timely resolution of vulnerabilities is crucial to ensure user safety in network devices. 

They emphasized the significance of proactive security measures in designing and maintaining such devices.

The convergence of these vulnerabilities presents a range of potential threats, such as exposing sensitive data, facilitating unauthorized access to networks, and enabling the deployment of malicious software and ransomware.

Hadess has released a Proof of Concept (PoC), which showcases the exploitation of the CVE-2023-47464 vulnerability.

The GL-AX1800 routers running on Firmware Version 4.0.0 are susceptible to a vulnerability addressed in the latest version, 4.5.0.

To ensure protection against cyber attacks, it is highly recommended for users to upgrade to the latest version of Firmware. The updated Firmware can be downloaded from the provided link.

In the current era of digital advancements, as soon as a vulnerability is discovered and a proof-of-concept (PoC) is made available, there is a sudden surge in the number of attacks that exploit it. 

The Citrixbleed vulnerability is a security flaw that can be accessed once the Proof of Concept (POC) is released. This vulnerability has been exploited in real-world situations.

This emphasizes the need for prompt patching and security measures to safeguard against potential threats.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.





Source link