Impact
GL-iNet GL-AR300M16 firmware version 4.3.11 contains a command injection flaw in the set_config function. An attacker who can supply a specially crafted request can execute arbitrary system commands, giving them full control over the device. The vulnerability exposes the confidentiality, integrity, and availability of the device and any networks it connects to.
Affected Systems
The affected product is GL-iNet GL-AR300M16 with firmware 4.3.11. No other version information is provided, but the CPE data references that exact firmware revision.
Risk and Exploitability
The CVSS score is 9.8, indicating critical severity. The EPSS score is below 1%, suggesting current exploit activity is low, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, via the device’s HTTP API that exposes the set_config function, although the description does not explicitly state the transport. Given the high impact, even a low probability exploit warrants immediate attention.
OpenCVE Enrichment