Description
The GL-iNet Comet (GL-RM1) KVM before 1.8.2 does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins.
Published: 2026-03-17
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated root access via UART console leading to full system compromise
Action: Patch immediately
AI Analysis

Impact

The vulnerability exists in GL‑iNet Comet KVM firmware versions earlier than 1.8.2. The UART serial console does not enforce authentication, allowing anyone with physical access to the device to log in as root. This bypass of required authentication (CWE‑306) means an attacker could obtain complete control of the device, modify configuration, exfiltrate data, or pivot to other devices on the network.

Affected Systems

Affected products are the GL‑iNet Comet KVM, model GL‑RM1. All firmware releases prior to 1.8.2 are vulnerable. Users of devices running those firmware versions must verify the firmware and update if possible.

Risk and Exploitability

The CVSS score of 7 indicates a high severity vulnerability. The EPSS score of less than 1% reflects a low likelihood of exploitation in the wild, and the vulnerability is not included in the CISA KEV catalog. Exploitation requires physical access to connect to the UART pins, which limits the attack surface. Nevertheless, devices deployed in environments where attackers could gain physical access pose a significant risk.

Generated by OpenCVE AI on March 23, 2026 at 20:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device firmware to 1.8.2 or later to enforce UART authentication
  • If an update is not possible, restrict physical access to the UART pins by securing the device enclosure or disabling the UART interface in hardware
  • Verify that the UART console is no longer accessible by connecting a serial client and confirming authentication is required

Generated by OpenCVE AI on March 23, 2026 at 20:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Gl-inet comet Gl-rm1
Gl-inet comet Gl-rm1 Firmware
CPEs cpe:2.3:h:gl-inet:comet_gl-rm1:-:*:*:*:*:*:*:*
cpe:2.3:o:gl-inet:comet_gl-rm1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Gl-inet comet Gl-rm1
Gl-inet comet Gl-rm1 Firmware

Mon, 23 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description The GL-iNet Comet (GL-RM1) KVM does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins. The GL-iNet Comet (GL-RM1) KVM before 1.8.2 does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins.
References

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Gl-inet
Gl-inet comet Kvm
Vendors & Products Gl-inet
Gl-inet comet Kvm

Tue, 17 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description The GL-iNet Comet (GL-RM1) KVM does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins.
Title GL-iNet Comet (GL-RM1) KVM unauthenticated root access via UART serial console
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Gl-inet Comet Gl-rm1 Comet Gl-rm1 Firmware Comet Kvm
cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-03-23T19:34:20.347Z

Reserved: 2026-03-11T18:26:10.038Z

Link: CVE-2026-32291

cve-icon Vulnrichment

Updated: 2026-03-17T18:12:31.408Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T18:16:16.057

Modified: 2026-04-27T12:36:50.560

Link: CVE-2026-32291

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:07Z

Weaknesses