Impact
The vulnerability resides in the GL-iNet Comet (GL-RM1) KVM’s boot‑time provisioning process. During startup the device contacts a GL‑iNet site to download client and CA certificates. The implementation does not verify the authenticity of these certificates, allowing an attacker in a man‑in‑the‑middle position to serve forged client and CA certificates. Because the device will attempt to use those invalid certificates, it subsequently fails to establish a connection with the legitimate GL‑iNet KVM cloud service. The immediate consequence is a loss of connectivity and potential denial of service for the device. The weakness is categorized as Improper Certificate Validation (CWE‑295).
Affected Systems
Affected product: GL‑iNet Comet KVM (GL‑RM1). No specific affected firmware or hardware version data is provided in the CNA entries.
Risk and Exploitability
The CVSS base score is 6.3, indicating medium severity. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to perform a network‑layer man‑in‑the‑middle attack during the device’s boot sequence when it initiates the provisioning request. Successful exploitation results in failed provisioning and service interruption; it does not directly allow privileged code execution or data exfiltration based on the supplied description.
OpenCVE Enrichment