Description
The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.
Published: 2026-03-17
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Brute‑Force Credential Compromise
Action: Apply Update
AI Analysis

Impact

The GL‑iNet Comet (GL‑RM1) router’s KVM web interface permits unlimited login attempts, enabling an attacker to brute‑force credentials. This flaw, classified as CWE‑307, allows unauthorized individuals to discover the administrator password and gain full control of the device’s management functions. The impact is a complete compromise of account integrity, potentially allowing system configuration changes, traffic manipulation, or further lateral movement within the network.

Affected Systems

All GL‑iNet Comet (GL‑RM1) devices that include the KVM web interface are affected. No specific firmware revision is listed, indicating that every build with the KVM feature remains susceptible until a mitigation is applied.

Risk and Exploitability

The vulnerability has a CVSS score of 9.3, which marks it as critical severity. EPSS data is not available and the issue is not currently cataloged in CISA’s Known Exploit Vulnerabilities list. The attack requires only remote reachability of the KVM interface; no local access or privileged execution is needed. If default or weak credentials are present, a brute‑force attack could succeed within a relatively short time. While no public exploits have been reported, the simplicity of the attack vector makes exploitation highly likely for motivated adversaries.

Generated by OpenCVE AI on March 17, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install any available firmware update from GL‑iNet that introduces login request rate limiting for the KVM interface.
  • If no update is available, immediately change the default KVM credentials to a strong, unique password to make brute‑force attempts infeasible.
  • Limit access to the KVM web interface by configuring firewall rules or network segmentation so that only trusted administrative IP addresses can reach it.
  • Enable logging of failed login attempts and monitor the logs for repeated brute‑force activity, alerting security personnel when thresholds are exceeded.

Generated by OpenCVE AI on March 17, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Gl-inet comet Gl-rm1
Gl-inet comet Gl-rm1 Firmware
CPEs cpe:2.3:h:gl-inet:comet_gl-rm1:-:*:*:*:*:*:*:*
cpe:2.3:o:gl-inet:comet_gl-rm1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Gl-inet comet Gl-rm1
Gl-inet comet Gl-rm1 Firmware

Mon, 23 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
References

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Gl-inet
Gl-inet comet Kvm
Vendors & Products Gl-inet
Gl-inet comet Kvm

Tue, 17 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.
Title GL-iNet Comet (GL-RM1) KVM insufficient login rate-limiting
Weaknesses CWE-307
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


Subscriptions

Gl-inet Comet Gl-rm1 Comet Gl-rm1 Firmware Comet Kvm
cve-icon MITRE

Status: PUBLISHED

Assigner: cisa-cg

Published:

Updated: 2026-03-23T19:34:33.902Z

Reserved: 2026-03-11T18:26:16.060Z

Link: CVE-2026-32292

cve-icon Vulnrichment

Updated: 2026-03-17T17:56:27.953Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T18:16:16.227

Modified: 2026-04-27T12:39:01.693

Link: CVE-2026-32292

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:06Z

Weaknesses