An issue was discovered on GL.iNet devices before 3.216. The function guci2_get() found in libglutil.so has a buffer overflow when an item is requested from a UCI context, and the value is pasted into a char pointer to a buffer without checking the size of the buffer.

Project Subscriptions

Vendors Products
Gl-inet Subscribe
Gl-a1300 Subscribe
Gl-a1300 Firmware Subscribe
Gl-ap1300 Subscribe
Gl-ap1300 Firmware Subscribe
Gl-ap1300lte Subscribe
Gl-ap1300lte Firmware Subscribe
Gl-ar300m Subscribe
Gl-ar300m Firmware Subscribe
Gl-ar750 Subscribe
Gl-ar750 Firmware Subscribe
Gl-ar750s Subscribe
Gl-ar750s Firmware Subscribe
Gl-ax1800 Subscribe
Gl-ax1800 Firmware Subscribe
Gl-axt1800 Subscribe
Gl-axt1800 Firmware Subscribe
Gl-b1300 Subscribe
Gl-b1300 Firmware Subscribe
Gl-b2200 Subscribe
Gl-b2200 Firmware Subscribe
Gl-e750 Subscribe
Gl-e750 Firmware Subscribe
Gl-mifi Subscribe
Gl-mifi Firmware Subscribe
Gl-mt1300 Subscribe
Gl-mt1300 Firmware Subscribe
Gl-mt2500 Subscribe
Gl-mt2500 Firmware Subscribe
Gl-mt2500a Subscribe
Gl-mt2500a Firmware Subscribe
Gl-mt3000 Subscribe
Gl-mt3000 Firmware Subscribe
Gl-mt300n-v2 Subscribe
Gl-mt300n-v2 Firmware Subscribe
Gl-mv1000 Subscribe
Gl-mv1000 Firmware Subscribe
Gl-mv1000w Subscribe
Gl-mv1000w Firmware Subscribe
Gl-s10 Firmware Subscribe
Gl-s1300 Subscribe
Gl-s1300 Firmware Subscribe
Gl-s200 Subscribe
Gl-s200 Firmware Subscribe
Gl-s20 Firmware Subscribe
Gl-sf1200 Subscribe
Gl-sf1200 Firmware Subscribe
Gl-sft1200 Subscribe
Gl-sft1200 Firmware Subscribe
Gl-usb150 Subscribe
Gl-usb150 Firmware Subscribe
Gl-x1200 Subscribe
Gl-x1200 Firmware Subscribe
Gl-x3000 Subscribe
Gl-x3000 Firmware Subscribe
Gl-x300b Subscribe
Gl-x300b Firmware Subscribe
Gl-x750 Subscribe
Gl-x750 Firmware Subscribe
Gl-xe300 Subscribe
Gl-xe300 Firmware Subscribe
Microuter-n300 Subscribe
Microuter-n300 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 27 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-01-27T17:17:11.696Z

Reserved: 2023-04-28T00:00:00.000Z

Link: CVE-2023-31475

cve-icon Vulnrichment

Updated: 2024-08-02T14:53:30.627Z

cve-icon NVD

Status : Modified

Published: 2023-05-11T11:15:09.147

Modified: 2025-01-27T18:15:33.980

Link: CVE-2023-31475

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses