Description
GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerability via the add_group() function. This vulnerability allows attackers to execute arbitrary SQL database operations via a crafted HTTP request.
Published: 2026-03-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

The GL-iNet GL-AR300M16 firmware 4.3.11 contains a SQL injection vulnerability in the add_group() function that allows an attacker to execute arbitrary SQL database operations via a crafted HTTP request. This defect can lead to unauthorized read, modification, or deletion of database contents, thereby compromising confidentiality and integrity of the device’s configuration and stored data. The vulnerability is classified as CWE‑89 according to the vendor description.

Affected Systems

Affected product: GL‑iNet GL‑AR300M16 router with firmware version 4.3.11. The vulnerability exists in the device firmware component identified by the CPE cpe:2.3:o:gl‑inet:ar300m16_firmware:4.3.11. No other version variants are listed.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity of the flaw. EPSS indicates an exploitation probability of less than 1 %. It is not listed in the CISA KEV catalog. The CVE description does not specify an exact attack vector, but the flaw is triggered by a malicious HTTP request to the device, implying a remote, web‑based exploitation scenario that could be executed from an adjacent network or over the internet if the router is publicly reachable. Although the low EPSS suggests limited current exploitation, the high CVSS warrants timely remediation.

Generated by OpenCVE AI on March 18, 2026 at 15:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated firmware version that addresses the add_group() SQL injection flaw if available from GL‑iNet.
  • If a patch is not yet released, restrict external access to the device by placing it behind a firewall or configuring access‑control lists to block untrusted networks from reaching the web interface or the add_group() endpoint.
  • Disable or remove the add_group() functionality if possible, or enable input validation to guard against malformed requests.
  • Monitor device logs for unusual SQL activity or failed authentication attempts to detect potential exploitation.
  • Ensure overlay network segmentation so that the router’s administrative interface is isolated from general user traffic.

Generated by OpenCVE AI on March 18, 2026 at 15:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in GL‑iNet GL‑AR300M16 Firmware 4.3.11 via add_group()

Sat, 14 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Gl-inet ar300m16
Gl-inet ar300m16 Firmware
Weaknesses CWE-89
CPEs cpe:2.3:h:gl-inet:ar300m16:-:*:*:*:*:*:*:*
cpe:2.3:o:gl-inet:ar300m16_firmware:4.3.11:*:*:*:*:*:*:*
Vendors & Products Gl-inet ar300m16
Gl-inet ar300m16 Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Gl-inet
Gl-inet gl-ar300m16
Vendors & Products Gl-inet
Gl-inet gl-ar300m16

Thu, 12 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerability via the add_group() function. This vulnerability allows attackers to execute arbitrary SQL database operations via a crafted HTTP request.
References

Subscriptions

Gl-inet Ar300m16 Ar300m16 Firmware Gl-ar300m16
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-14T03:28:33.618Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26794

cve-icon Vulnrichment

Updated: 2026-03-14T03:28:22.887Z

cve-icon NVD

Status : Modified

Published: 2026-03-12T18:16:22.940

Modified: 2026-03-16T14:18:27.400

Link: CVE-2026-26794

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:26Z

Weaknesses