Impact
The vulnerability arises because the KVM firmware update process on GL-iNet Comet (GL‑RM1) does not adequately verify the authenticity of uploaded firmware. An attacker can modify the firmware image and its accompanying MD5 checksum, causing the device to accept a malicious payload. This flaw enables arbitrary code execution or complete device takeover once the firmware is installed.
Affected Systems
The issue affects GL‑iNet's Comet KVM product before firmware version 1.8.2. Devices running these older releases are susceptible. Personal or enterprise networks that deploy the GL‑RM1 model without updating are at risk.
Risk and Exploitability
With a CVSS score of 7 the vulnerability is considered high severity. The EPSS score is below 1% and the flaw is not listed as a known exploited vulnerability by CISA, suggesting a low exploitation likelihood in the wild. Nonetheless, an attacker who has network access or can engineer a Man‑in‑the‑Middle position against the device's update mechanism can supply the forged firmware. The consequent compromise would grant full control over the router and expose the surrounding network.
OpenCVE Enrichment